派博傳思國際中心

標題: Titlebook: Electronic Government and the Information Systems Perspective; 10th International C Andrea K?,Enrico Francesconi,Ismail Khalil Conference p [打印本頁]

作者: SCOWL    時間: 2025-3-21 17:46
書目名稱Electronic Government and the Information Systems Perspective影響因子(影響力)




書目名稱Electronic Government and the Information Systems Perspective影響因子(影響力)學(xué)科排名




書目名稱Electronic Government and the Information Systems Perspective網(wǎng)絡(luò)公開度




書目名稱Electronic Government and the Information Systems Perspective網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Electronic Government and the Information Systems Perspective被引頻次




書目名稱Electronic Government and the Information Systems Perspective被引頻次學(xué)科排名




書目名稱Electronic Government and the Information Systems Perspective年度引用




書目名稱Electronic Government and the Information Systems Perspective年度引用學(xué)科排名




書目名稱Electronic Government and the Information Systems Perspective讀者反饋




書目名稱Electronic Government and the Information Systems Perspective讀者反饋學(xué)科排名





作者: ticlopidine    時間: 2025-3-21 22:38

作者: 兩種語言    時間: 2025-3-22 03:17

作者: 苦惱    時間: 2025-3-22 05:53

作者: 現(xiàn)實    時間: 2025-3-22 10:15

作者: 機警    時間: 2025-3-22 13:31
Vulnerability of State-Provided Electronic Identification: The Case of ROCA in?Estonia what implications this large-scale security risk poses on a fully rolled-out state-provided eID scheme. The analysis focuses on three areas, i.e., (i) the state’s political tasks and responsibilities, (ii) the role of the ICT industry in the eID provision process; and, (iii) the opportunities and o
作者: 機警    時間: 2025-3-22 19:49
Transparency by Default: GDPR Patterns for Agile Developmenteneral Data Protection Regulation (GDPR) and fosters users’ trust in the system. Transparency, when used correctly, is a tool to achieve this. The adoption of agile approaches, focused on coding and rapidly evolving functionality in situations where requirements are unclear or fast changing, poses n
作者: gnarled    時間: 2025-3-22 23:26
Anonymization Between Minimization and Erasure: The Perspectives of French and Italian Data Protectiion in the Member States’ anonymization policies, in which regard stakeholders would like additional guidelines..In keeping with this premise, this article aims to analyze and compare trends in the implementation and enforcement of anonymization policies put in place by data protection authorities i
作者: 作繭自縛    時間: 2025-3-23 02:13
A Legal Framework for Digital Transformation: A Proposal Based on a Comparative Case Studyonent of each e-government ecosystem to ensure proper delivery of e-services. This research proposes a legal framework for e-government in the Kurdistan Region of Iraq (KRI). The research started with the KRI’s e-Court system project as the first pilot project towards the systematic introduction of
作者: 摸索    時間: 2025-3-23 05:39

作者: grotto    時間: 2025-3-23 13:45

作者: 調(diào)整    時間: 2025-3-23 17:18

作者: 防水    時間: 2025-3-23 18:10

作者: 運動的我    時間: 2025-3-24 00:33

作者: INCUR    時間: 2025-3-24 02:43

作者: 思想    時間: 2025-3-24 08:20
0302-9743 rs are organized in 3 topical sections: e-government theoretical background and cases; identity management and legal issues; artificial intelligence and machine learning in e-government context.978-3-030-86610-5978-3-030-86611-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: neutral-posture    時間: 2025-3-24 10:41

作者: Electrolysis    時間: 2025-3-24 15:58

作者: Incompetent    時間: 2025-3-24 19:27
,Introduction: The People on Stage, 1934–39,ep insight into the crisis management process as well as into the characteristics of the Estonian eID area. Based on the insights from the Estonian case, we suggest a paradigm shift of eID management that recognises eID as the citizens’ right and its provision as the state’s obligation.
作者: 變色龍    時間: 2025-3-25 01:05

作者: Anonymous    時間: 2025-3-25 03:55

作者: Lament    時間: 2025-3-25 08:11

作者: 真繁榮    時間: 2025-3-25 14:20

作者: 我要沮喪    時間: 2025-3-25 18:37
Conference proceedings 2021resented were carefully reviewed and selected from 21 submissions and focus on information systems and ICT aspects of e-government. The papers are organized in 3 topical sections: e-government theoretical background and cases; identity management and legal issues; artificial intelligence and machine learning in e-government context.
作者: 紳士    時間: 2025-3-25 20:59
,The PCE’s Long Road to Democracy 1954–77,n two countries: France and Italy..This analysis makes it possible to trace the evolution of these policies and highlight their critical importance in applying the data minimization principle and in enforcing the right to erasure under Art. 17 GDPR.
作者: 跑過    時間: 2025-3-26 02:47
Maroesjka van Nieuwenhuijzen,Christel Elias study contributes through a uniform understanding of public service platforms. Despite constitutive elements, the proposed framework for platforms in the public sector may guide future analysis. The analysis framework is applied to platforms of federal states in the European Union.
作者: 包租車船    時間: 2025-3-26 06:57

作者: 虛假    時間: 2025-3-26 08:41
In Search of Marie-Antoinette in the 1930shms predominantly classified the tweets as “neutral”, that is, these posts do not explicitly expose their users’ opinion about the topic. Of the tweets that showed polarity, there was a dominance of posts classified as “positive”, i.e., their authors have positive feelings (support, affinity) concerning the Social Security Reform proposal.
作者: fringe    時間: 2025-3-26 13:37
https://doi.org/10.1007/978-3-642-95481-8hese four latent features. We identify taxpayers located at the boundary of each cluster by using kernel density estimation, which is further investigated to single out tax evaders. We applied our method to the iron and steel taxpayers data set provided by the Commercial Taxes Department, the government of Telangana, India.
作者: Range-Of-Motion    時間: 2025-3-26 20:17
The Province and Function of Peace Researchmization techniques. The results achieved good success rates. Results for XGBoost using balanced data showed a recall of 89.3% and unbalanced data 87.8%. However, for unbalanced data, the AUC score was 98.1%, against 97.9% for balanced data.
作者: 絆住    時間: 2025-3-26 23:00

作者: 根除    時間: 2025-3-27 04:46

作者: Surgeon    時間: 2025-3-27 08:08
Social Security Reform in Brazil: A?Twitter Sentiment Analysishms predominantly classified the tweets as “neutral”, that is, these posts do not explicitly expose their users’ opinion about the topic. Of the tweets that showed polarity, there was a dominance of posts classified as “positive”, i.e., their authors have positive feelings (support, affinity) concerning the Social Security Reform proposal.
作者: 充足    時間: 2025-3-27 09:37

作者: 民間傳說    時間: 2025-3-27 16:02
Using Machine Learning for Risk Classification in Brazilian Federal Voluntary Transfersmization techniques. The results achieved good success rates. Results for XGBoost using balanced data showed a recall of 89.3% and unbalanced data 87.8%. However, for unbalanced data, the AUC score was 98.1%, against 97.9% for balanced data.
作者: 健忘癥    時間: 2025-3-27 19:33
0302-9743 rspective, EGOVIS 2021, held in September 2021 as part of the DEXA 2021 conference. The event was held virtually due to COVID-19 pandemic.. The 13 full papers presented were carefully reviewed and selected from 21 submissions and focus on information systems and ICT aspects of e-government. The pape
作者: 細查    時間: 2025-3-27 23:24
Margaret C. Jacob,Catherine Secretanpleteness, correctness, and freshness of the intercepted contents should be given. Moreover, contents often have to be transferred from law enforcement agencies to Courts or delivered to the defence, also partially. In this work, we design a complex architecture able to support effectively the above needs.
作者: 忙碌    時間: 2025-3-28 04:36
978-3-030-86610-5Springer Nature Switzerland AG 2021
作者: hardheaded    時間: 2025-3-28 08:03
Electronic Government and the Information Systems Perspective978-3-030-86611-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: eustachian-tube    時間: 2025-3-28 12:03
https://doi.org/10.1007/978-3-030-86611-2artificial intelligence; communication systems; pricacy, trust, security; computer networks; computer pr
作者: 重疊    時間: 2025-3-28 15:38

作者: craving    時間: 2025-3-28 19:26

作者: 審問,審訊    時間: 2025-3-29 01:45
Doris through the French Looking-Glass,xist some technological tools such as the panic button for the women under threat or piloting the ankle bracelets provided for the restraining orders in some regions of Turkey. However, each day‘s increasing number of femicides shows that those attempts stayed insufficient to bring sustainable solut
作者: 者變    時間: 2025-3-29 05:02
In Pursuit of Equity in Educationrtain challenges comparable to that of traditional enterprises, existing SC architectures are often based on generic enterprise architecture (EA) frameworks. However, the resulting SC architectures tend to suffer from several weaknesses and existing research does not detail the process of developing
作者: 極微小    時間: 2025-3-29 07:24
,The Town-Ho’s Story and Other Gams,be widespread among European citizens, companies, and public administrations. To this end, initiatives such as the EO-UPTAKE Ligurian regional project aim at studying application scenarios centered on the use of Copernicus data and the dissemination of their outcomes to citizens and local authoritie
作者: 阻礙    時間: 2025-3-29 13:49
,Introduction: The People on Stage, 1934–39, what implications this large-scale security risk poses on a fully rolled-out state-provided eID scheme. The analysis focuses on three areas, i.e., (i) the state’s political tasks and responsibilities, (ii) the role of the ICT industry in the eID provision process; and, (iii) the opportunities and o
作者: 枕墊    時間: 2025-3-29 18:06
https://doi.org/10.1007/978-981-16-0390-7eneral Data Protection Regulation (GDPR) and fosters users’ trust in the system. Transparency, when used correctly, is a tool to achieve this. The adoption of agile approaches, focused on coding and rapidly evolving functionality in situations where requirements are unclear or fast changing, poses n
作者: demote    時間: 2025-3-29 22:41
,The PCE’s Long Road to Democracy 1954–77,ion in the Member States’ anonymization policies, in which regard stakeholders would like additional guidelines..In keeping with this premise, this article aims to analyze and compare trends in the implementation and enforcement of anonymization policies put in place by data protection authorities i
作者: BRINK    時間: 2025-3-30 02:51
https://doi.org/10.1007/978-1-4612-0837-2onent of each e-government ecosystem to ensure proper delivery of e-services. This research proposes a legal framework for e-government in the Kurdistan Region of Iraq (KRI). The research started with the KRI’s e-Court system project as the first pilot project towards the systematic introduction of
作者: 虛情假意    時間: 2025-3-30 05:22

作者: refine    時間: 2025-3-30 11:10
In Search of Marie-Antoinette in the 1930s an automatic investigation of this polarity using sentiment analysis techniques. We collected 980,577 tweets published between January and November of that year and compared four supervised machine learning algorithms: Multinomial Na?ve Bayes, Logistic Regression, Support Vector Machines, and Rando
作者: conifer    時間: 2025-3-30 12:55
https://doi.org/10.1007/978-3-642-95481-8revenue of a country. We design a model based on variational graph autoencoders and clustering to identify taxpayers who are evading indirect tax by providing false information in their tax returns. We derive six correlation parameters (features) and three ratio parameters from the data submitted by
作者: 裁決    時間: 2025-3-30 17:32
The Province and Function of Peace Researchents with the Federal Government to execute their public policies. To improve timeliness in the recovery process of default resource usage, a classification tool is necessary to assign risk profiles of the success or failure of these transfers. In this paperwork, we propose the use of the eXtreme Gr
作者: Catheter    時間: 2025-3-30 23:39
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/306318.jpg
作者: 費解    時間: 2025-3-31 01:17
Can Tech4Good Prevent Domestic Violence and Femicides? An Intelligent System Design Proposal for Reso integrate crime prediction and prevention solutions into the institutional system. By satisfying prediction, prevention, and protection functions simultaneously, it aims to address most of the existing system‘s pain points.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
哈巴河县| 海晏县| 福鼎市| 海原县| 苍山县| 广西| 漠河县| 乃东县| 平阳县| 巫溪县| 永年县| 丹寨县| 娄烦县| 阿巴嘎旗| 含山县| 昌乐县| 衡阳市| 广德县| 靖州| 昭平县| 长乐市| 买车| 万源市| 黎平县| 麻阳| 栖霞市| 伊吾县| 新余市| 舟曲县| 互助| 武城县| 彭阳县| 柞水县| 台前县| 青海省| 绍兴市| 无为县| 英山县| 林周县| 台东市| 哈尔滨市|