Advances in Electronic Government, Digital Divide, and Regional Development最新文献

筛选
英文 中文
A Comprehensive Review of the Security and Privacy Issues in Blockchain Technologies 区块链技术中的安全和隐私问题综述
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-8493-4.ch008
M. Ghonge, N. Pradeep, Renjith V. Ravi, Ramchandra S. Mangrulkar
{"title":"A Comprehensive Review of the Security and Privacy Issues in Blockchain Technologies","authors":"M. Ghonge, N. Pradeep, Renjith V. Ravi, Ramchandra S. Mangrulkar","doi":"10.4018/978-1-7998-8493-4.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-8493-4.ch008","url":null,"abstract":"The development of blockchain technology relies on a variety of disciplines, including cryptography, mathematics, algorithms, and economic models. All cryptocurrency transactions are recorded on a digital and decentralized public ledger known as the blockchain. Customers may keep track of their crypto-transactions by looking at a chronological list rather than a centralized ledger. The blockchain's application potential is bright, and it has already produced results. In various fields, blockchain technology has been incorporated and deployed, from the earliest days of cryptocurrencies to the present day with new-age smart contracts. No comprehensive study on blockchain security and privacy has yet been done despite numerous studies in this area over the years. In this chapter, the authors talked about blockchain's security and privacy issues as well as the impact they've had on various trends and applications. This chapter covers both of these topics.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Policymakers and Intelligence Analysts as Decision-Making Agents 决策者和情报分析员作为决策代理人
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1562-4.ch001
{"title":"Policymakers and Intelligence Analysts as Decision-Making Agents","authors":"","doi":"10.4018/978-1-7998-1562-4.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-1562-4.ch001","url":null,"abstract":"Decision making is a process of choosing among alternative courses of action to attain a goal(s). Specifically, managerial decision-making is a complex task in today's political/business environment. Information analysis is gathered by an intelligence analyst, as someone who is primarily responsible for the analysis, processing, and distribution of strategic and tactical intelligence. The chapter explores the main approaches to both policy cycle and intelligence cycle to make decisions.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Significant Trends of Smart Technologies 智能技术的重大趋势
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-6684-3509-0.ch004
{"title":"Significant Trends of Smart Technologies","authors":"","doi":"10.4018/978-1-6684-3509-0.ch004","DOIUrl":"https://doi.org/10.4018/978-1-6684-3509-0.ch004","url":null,"abstract":"Although technology advances in a high speed and in different tracks and sectors, among the many major areas of trends of smart technologies are clouds and artificial intelligence. This chapter presents such significant trends in smart technologies with emphasis on clouds and their applications which make the implementation of smart cities efficient. It focuses on the general paradigm for smart technology platforms with five different levels, including edge and fog computing as well as the internet of things. In the chapter, other trends are covered such as data analytics for strategic decision making, artificial intelligence, machine learning, blockchain, open data, and cloud-based data. It also introduces the significance of using predictive analytics and using data for effective deep learning for smart applications.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of IoT in Digital Governance 物联网在数字治理中的作用
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1851-9.ch007
Azeem Khan, Noor Zaman Jhanjhi, M. Humayun, Muneer Ahmad
{"title":"The Role of IoT in Digital Governance","authors":"Azeem Khan, Noor Zaman Jhanjhi, M. Humayun, Muneer Ahmad","doi":"10.4018/978-1-7998-1851-9.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-1851-9.ch007","url":null,"abstract":"The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set of physical electronic devices embedded with intelligence, connected through a network, enabling them to collect and exchange data, and allowing these devices to be sensed and handled remotely between the physical and cyber worlds. The devices connected through the internet has been influencing all walks of our life ranging from individual, societal, educational, industrial, entrepreneurial, and related to governance as well. As we are connected and surrounded with a plethora of connected smart devices, it seems there is a great risk of security and privacy in several aspects, such as device authentication, data theft, device manipulation, data falsification, etc., to name a few. Hence, the current chapter has been undertaken to explore and comprehend the security and privacy related implications, opportunities, future directions, and challenges involved in implementing digital governance with IoT.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Systematic Review of Information Technologies to Assist Policymaking in Crisis Management 资讯科技协助危机管理决策的系统检讨
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-9815-3.ch001
M. Ali
{"title":"A Systematic Review of Information Technologies to Assist Policymaking in Crisis Management","authors":"M. Ali","doi":"10.4018/978-1-7998-9815-3.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-9815-3.ch001","url":null,"abstract":"The COVID-19 crisis has engulfed several countries, leaving policymakers perplexed and unprepared to deal with the situation. Choosing the most appropriate course of action has become more challenging as a result of the infection and its effects on the body. While dealing with the coronavirus crisis and the stress that goes with it, new information technologies are critical in addressing and alleviating that stress. As a result, new information technology capabilities are required to address the challenges confronting policymakers when dealing with pandemic diseases such as COVID-19 in the past. As a result of the systematic review process used in this study, the best available evidence is synthesised from text and opinion to provide actionable advice to policymakers. The findings indicate that the challenges fall into two categories: battling the disease and mitigating its effects. Furthermore, the internet of things, cloud computing, machine learning, and social networking all contribute significantly to resolving these issues.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations 用于检测当代组织内部威胁的DBMS日志分析
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5984-9.CH010
Muhammad Imran Khan, S. Foley, B. O’Sullivan
{"title":"DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations","authors":"Muhammad Imran Khan, S. Foley, B. O’Sullivan","doi":"10.4018/978-1-5225-5984-9.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-5984-9.CH010","url":null,"abstract":"Insiders are legitimate users of a system; however, they pose a threat because of their granted access privileges. Anomaly-based intrusion detection approaches have been shown to be effective in the detection of insiders' malicious behavior. Database management systems (DBMS) are the core of any contemporary organization enabling them to store and manage their data. Yet insiders may misuse their privileges to access stored data via a DBMS with malicious intentions. In this chapter, a taxonomy of anomalous DBMS access detection systems is presented. Secondly, an anomaly-based mechanism that detects insider attacks within a DBMS framework is proposed whereby a model of normative behavior of insiders n-grams are used to capture normal query patterns in a log of SQL queries generated from a synthetic banking application system. It is demonstrated that n-grams do capture the short-term correlations inherent in the application. This chapter also outlines challenges pertaining to the design of more effective anomaly-based intrusion detection systems to detect insider attacks.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"62 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Success Stories of ICT Implementation in Saudi Arabia 沙特阿拉伯实施信息通信技术的成功案例
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1851-9.ch008
Saira Muzafar, Noor Zaman Jhanjhi
{"title":"Success Stories of ICT Implementation in Saudi Arabia","authors":"Saira Muzafar, Noor Zaman Jhanjhi","doi":"10.4018/978-1-7998-1851-9.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-1851-9.ch008","url":null,"abstract":"Information and communication technology (ICT) has a great role in the development, growth, and economy of the country. ICT refers to any system, device, or product that can store, manipulate, and receive and transmit digital data effectively. ICT brings clear differences in the economy of countries wherever it is successfully implemented. It becomes a reason of timely, accurate, and efficient operations and becomes a source of user satisfaction by providing them fast, better, easy service around the clock. As timely access of information and communication plays a vital role in the success of any organization either public or private, many developed countries are already competing in digitalization. It is not only convenience, but it is the prime ingredient of good governance and an indispensable part of modern life. This chapter discusses the successful implementation of ICT infrastructures in the context of good governance and builds a vibrant society, the main agenda of Vision 2030 of KSA.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"74 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Internet Service Provider Liability in Relation to P2P Sites 互联网服务提供商对P2P网站的责任
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5984-9.CH008
Nisha Dhanraj Dewani
{"title":"Internet Service Provider Liability in Relation to P2P Sites","authors":"Nisha Dhanraj Dewani","doi":"10.4018/978-1-5225-5984-9.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-5984-9.CH008","url":null,"abstract":"Different systems require different levels of security according to the services they provide to their users. Cyberspace is the alliance of various networks together connected through internet service providers (ISPs). However, the alliance of these networks often faces security issues. Some use the internet as a path for illegal activities such as breaching of others computer or networks, damaging and stealing information, and blocking or denying legitimate users from services they subscribe. So, the purpose of this chapter is to review the responsibilities of ISPs in securing their customers' network, and find out whether there are legal provisions, or liabilities that are bindings on the ISPs to provide security for their customers. What protections are envisaged under the umbrella of safe harbors? Are ISPs responsible for end users' network security? The Swedish Court recently found The Pirate Bay (TPB) guilty of making copyright works available. Finally, this chapter will analyze the issues raised in the TPB along with ISPs liability.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"168 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134127643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Building of Democracy 民主的建设
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-4291-0.ch002
Raúl Alfonsín
{"title":"The Building of Democracy","authors":"Raúl Alfonsín","doi":"10.4018/978-1-7998-4291-0.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-4291-0.ch002","url":null,"abstract":"This chapter looks at the events leading up to the fall of communism in Czechoslovakia and Hungary in 1989. It addresses the overall climate that allowed communism to fall, along with specific events that took place in each country. The aftermath of the regime change is discussed as well as people's reactions to it. The chapter also looks at how democratic structures were built in each country. Finally, European Union membership is briefly discussed including how Czechs and Hungarians feel about the EU today.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Leveraging Digital Innovation for Governance, Public Administration, and Citizen Services 利用数字创新促进治理、公共管理和公民服务
Advances in Electronic Government, Digital Divide, and Regional Development Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5412-7
{"title":"Leveraging Digital Innovation for Governance, Public Administration, and Citizen Services","authors":"","doi":"10.4018/978-1-5225-5412-7","DOIUrl":"https://doi.org/10.4018/978-1-5225-5412-7","url":null,"abstract":"","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信