Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: Lecture Notes in Computer Science Ser. v.11032
Intro -- Preface -- Organization -- Contents -- Digitalization and Transparency -- Co-production of Digital Services: Definitions, Frameworks, Cases and Evaluation Initiatives - Findings from a Systematic Literature Review -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Execution of the Query -- 4 Results -- 4.1 Results from Questions 1 to 3 -- 4.2 Results from Questions 4 to 6 -- 5 Conclusions -- References -- The Effects of Co-creation on Citizens' Intentions to Accept Virtual Civil Servants -- Abstract -- 1 Introduction -- 2 Design of Engaged Intelligent Agents of e-Government -- 3 Research Propositions -- 4 General Discussion and Managerial Implications -- References -- Critical Factors that Impact Process Management Implementation Strategies: A Case Study of a Government Agency -- Abstract -- 1 Introduction -- 2 Critical Factors for Process Management (PM) -- 2.1 Organizational Culture -- 2.2 Information Technology -- 2.3 Governance -- 2.4 Performance -- 2.5 Strategic Alignment -- 2.6 People -- 3 Methodological Procedures -- 3.1 Research Model Development and Application -- 3.2 Theoretical Assumptions -- 3.3 Data Collection and Analysis -- 4 Case Study -- 4.1 Research Subjects -- 4.2 Analyses -- 5 Conclusions -- Acknowledgements -- References -- Challenges in e-Government Technology and e-voting -- Improving Opinion Analysis Through Statistical Disclosure Control in eVoting Scenarios -- 1 Introduction -- 2 Preliminaries -- 2.1 Privacy in Electronic Voting -- 2.2 SDC and Microaggregation -- 3 Problem Formulation -- 3.1 Threat Model -- 4 Architecture Design and Workflow -- 4.1 Entities Involved -- 4.2 Algorithms -- 4.3 Overall Workflow -- 4.4 Threat Assessment -- 5 Numerical Results -- 6 Conclusion -- References -- Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field -- 1 Introduction.
Problem melden