Sciweavers

343 search results - page 25 / 69
» The All-In Publication Policy
Sort
View
JUCS
2010
141views more  JUCS 2010»
13 years 9 months ago
How is e-Government Progressing? A Data Driven Approach to E-government Monitoring
: As ICT provide a lot of possibilities, high expectancies exist towards the electronic public service provision. All governments are increasingly establishing their e-strategies. ...
Jeroen Stragier, Pieter Verdegem, Gino Verleye
PERSUASIVE
2009
Springer
14 years 5 months ago
Design methods for ethical persuasive computing
Value Sensitive Design and Participatory Design are two methodological frameworks that account for ethical issues throughout the process of technology design. Through analysis and...
Janet Davis
IFIP
2007
Springer
14 years 5 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
ATAL
2005
Springer
14 years 4 months ago
Untraceability of mobile agents
In the article we present two untraceability protocols for mobile agents. Comparing to other solutions, the advantage of the protocols is that they support agent’s autonomy in c...
Rafal Leszczyna, Janusz Górski
SEMWEB
2005
Springer
14 years 4 months ago
On Partial Encryption of RDF-Graphs
In this paper a method for Partial RDF Encryption (PRE) is proposed in which sensitive data in an RDF-graph is encrypted for a set of recipients while all non-sensitive data remain...
Mark Giereth