23,084 research outputs found

    Innovative public governance through cloud computing: Information privacy, business models and performance measurement challenges

    Get PDF
    Purpose: The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach: We followed a multidisciplinary perspective (social, behavioral, business and technical) and conducted a conceptual analysis for analyzing the associated challenges. We conducted focus group interviews in two countries for evaluating the performance models that resulted from the conceptual analysis. Findings: This study identifies and analyzes several challenges that may emerge while adopting innovative technologies for public governance and e-government services. Furthermore, it presents suggested solutions deriving from the experience of designing a related platform for public governance, including issues of privacy requirements, proposed business models and key performance indicators for public services on cloud computing. Research limitations/implications: The challenges and solutions discussed are based on the experience gained by designing one platform. However, we rely on issues and challenges collected from four countries. Practical implications: The identification of challenges for innovative design of e-government services through a central portal in Europe and using service federation is expected to inform practitioners in different roles about significant changes across multiple levels that are implied and may accelerate the challenges' resolution. Originality/value: This is the first study that discusses from multiple perspectives and through empirical investigation the challenges to realize public governance through innovative technologies. The results emerge from an actual portal that will function at a European level. © Emerald Group Publishing Limited

    A methodological comparison between energy and environmental performance evaluation

    Get PDF
    The European Union is working on strategies in order to increase the energy efficiency of buildings. A useful solution is to identify the energy performance of buildings through the Energy Performance Certificate (EPC), as it provides information for the comparison of buildings with different architectural typology, shape, design technology and geographic location. However, this tool does not assess the real energy consumption of the building and does not always take into account its impact on the environment. In this work, two different types of analysis were carried out: one based only on the energy efficiency and the other one based on the environmental impact. Those analyses were applied on a standard building, set in three different Italian locations, with the purpose of obtaining cross-related information. After the evaluation of the results, interventions on some parameters (walls insulation, windows frame, filler gas in the insulated glazing) have been identified in order to improve the energy behavior of the building with an acceptable environmental impact. The aim of this paper is to propose a methodology that integrates the EPC with green building rating systems, leading to a more conscious choice of retrofit interventions as a compromise between energy performances and environmental impact

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    E-Commerce/Network Security Considerations

    Get PDF
    E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks

    From e-trash to e-treasure: how value can be created by the new e-business models for reverse logistics

    Get PDF
    Reverse logistics, that is, all operations related to the reuse of used products, excess inventory and packaging materials, gain increasing attention globally both for their promising financial potentials, the sustainable growth alternative they offer and the environmental positive impact they have. In this paper, we introduce reverse logistics and we explain how the adoption of e-commerce provides new possibilities to existing business models and what are the new e-business models in reverse logistics that have emerged. We compare these three new e-business models, namely, returns aggregators, specialty locators and integrated solution providers on a number of aspects and identify keys for their competitive advantage. Finally, we discuss conceptual and actual opportunities for these e-business models to thrive and advance and present some e-commerce tools that are being developed with the aim to address the distributed, dynamic and knowledge-intensive aspects of applications that contribute to the advancement of e-businesses in the field of reverse logistics.e-commerce;Reverse logistics;e-business models

    IMAGINE Final Report

    No full text

    Automated Crowdturfing Attacks and Defenses in Online Review Systems

    Full text link
    Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers. In this paper, we identify a new class of attacks that leverage deep learning language models (Recurrent Neural Networks or RNNs) to automate the generation of fake online reviews for products and services. Not only are these attacks cheap and therefore more scalable, but they can control rate of content output to eliminate the signature burstiness that makes crowdsourced campaigns easy to detect. Using Yelp reviews as an example platform, we show how a two phased review generation and customization attack can produce reviews that are indistinguishable by state-of-the-art statistical detectors. We conduct a survey-based user study to show these reviews not only evade human detection, but also score high on "usefulness" metrics by users. Finally, we develop novel automated defenses against these attacks, by leveraging the lossy transformation introduced by the RNN training and generation cycle. We consider countermeasures against our mechanisms, show that they produce unattractive cost-benefit tradeoffs for attackers, and that they can be further curtailed by simple constraints imposed by online service providers
    • …
    corecore