130,441 research outputs found

    Evaluating Citizen Adoption and Satisfaction of E-government in Mississippi

    Get PDF
    Governments at all levels are faced with the challenge of transformation and the need to reinvent government systems in order to deliver efficient and cost effective services, information, and knowledge through information and communication technologies. Electronic government, or e-government, is defined as a way for governments to use the most innovative information and communication technologies, particularly web-based Internet applications, to provide citizens and businesses with more convenient access to government information and services, to improve the quality of the services, and to provide greater opportunities to participate in democratic institutions and processes. E-government presents a tremendous impetus to move forward in the 21st century with higher quality, cost-effective, government services, and a better relationship between citizens and government. Notwithstanding the tremendous potential of e-government applications to deliver public sector services more efficiently and effectively, the citizenry must adopt and continually leverage these virtual offerings, such as renewing a driverā€™s license, for measurable value to be gained. In the process of designing and developing Web-based services which offer citizens both appropriate information and worthwhile services that are more convenient than traditional government transactions, public sector agencies must thoroughly recognize the elements that impact citizen adoption of and satisfaction with e-government. This research considers theoretical foundations from the Technology Acceptance Model (TAM), the Web Trust Model (WTM), and SERVQUAL to form a parsimonious model of citizen adoption and satisfaction for e-government services. This theory-oriented framework unites three research areas by asserting that an amalgamation of factors ā€“ technology adoption, trust, and service quality ā€“ influence an individualā€™s adoption propensity and service quality perception. Significant findings suggest usefulness, or end-user convenience, to be the principal determinant of e-government adoption and satisfaction, unaffected even when controlling demographic variables such as race, income, and education are introduced. Additionally, future implications of this research are discussed

    Non-functional Property based service selection: A survey and classification of approaches

    Get PDF
    In recent years there has been much eļ¬€ort dedicated to developing approaches for service selection based on non-functional properties. It is clear that much progress has been made, and by considering the individual approaches there is some overlap in functionality, but obviously also some divergence. In this paper we contribute a classiļ¬cation of approaches, that is, we deļ¬ne a number of criteria which allow to differentiate approaches. We use this classiļ¬cation to provide a comparison of existing approaches and in that sense provide a survey of the state of the art of the ļ¬eld. Finally we make some suggestions as to where the research in this area might be heading and which new challenges need to be addressed

    On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    Get PDF
    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u

    From Personal Memories to Sharable Memories

    Get PDF
    The exchange of personal experiences is a way of supporting decision making and interpersonal communication. In this article, we discuss how augmented personal memories could be exploited in order to support such a sharing. We start with a brief summary of a system implementing an augmented memory for a single user. Then, we exploit results from interviews to define an example scenario involving sharable memories. This scenario serves as background for a discussion of various questions related to sharing memories and potential approaches to their solution. We especially focus on the selection of relevant experiences and sharing partners, sharing methods, and the configuration of those sharing methods by means of reflection
    • ā€¦
    corecore