Citizen-Centric Access to E-Government Information Through Dynamic Taxonomies

Author(s):  
Giovanni M. Sacco

This chapter focuses on dynamic taxonomies, a semantic model for the transparent, guided, user-centric exploration of complex information bases. Although this model has an extremely wide application range, it is especially interesting in the context of e-government because it provides a single framework for the access and exploration of all e-government information and, differently from mainstream research, is citizen-centric, i.e., intended for the direct use of end-users rather than for programmatic or agent-mediated access. This chapter provides an example of interaction and discusses the application of the model to many diverse e-government areas, going from e-services to disaster planning and risk mitigation.

2004 ◽  
Vol 4 (2) ◽  
pp. 111-123 ◽  
Author(s):  
Peter Goldsmith ◽  
Karen Bender

Dynamics in the global food system, along with a cascade of technologies, drive demands for capturing information and sharing information vertically within the supply chain. Food safety, genetic engineering, and animal welfare all have contributed to the need for enhanced information flow within the supply chain. Identity preservation in grains and oilseeds is an emerging issue that may influence the structure of agriculture in the longer term. This research addresses the following questions. While demand for high-information grains appears to be growing, where and how along the supply chain is the value created and captured? Though it appears that the economy demands ever-increasing amounts of differentiation, why do opportunities for producers and life science companies to create and capture significant new sources of value remain elusive? To answer these questions needs assessments were conducted with grain procurement executives. Their responses reveal the "buyer's calculus" where buyers balance investment in specific relationship assets with the market uplift or risk mitigation return it generates. Buying from a competitively structured industry has numerous benefits. There is a "cost" or tradeoff leaving the spot market procurement model in favor of a relationship-based model; hence the calculus. The current equilibrium state reflects the current risk-adjusted value proposition suppliers deliver to end users. Though end-user benefits are on the horizon with the next generation of biotechnologies, their emergence is insufficient to guarantee farmers and life science greater returns. End users will always balance the risk mitigation and market uplift features of a supply offering with the risks of narrowing their supply base. To drive value up the chain, suppliers need to shift away from focusing solely on the products of the future and focus on the technologies, delivery systems, and organizational models that, when bundled with new products solve problems and make end users more competitive.


Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2019 ◽  
pp. 264-277
Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2008 ◽  
pp. 658-677
Author(s):  
Jens Jahnke ◽  
Yury Bychkov ◽  
David Dahlem ◽  
Luay Kawasme

Many recently emerging component-based Web portal application platforms allow end users to compose dynamic Web dialogues on the fly. Experts predict that this paradigm will enable a class of new applications for Web-based content delivery in information-rich, agile business domains, such as health care. We present a conceptual analysis of the user-based composition paradigm currently used and argue that its usability is limited with respect to complex dynamic applications. To overcome these limitations, we present an alternative composition paradigm, which is based on a semantic model of a portal’s application domain. We evaluate this approach with an application scenario in the health care domain.


2018 ◽  
Vol 26 (3) ◽  
pp. 306-326 ◽  
Author(s):  
Manal Alohali ◽  
Nathan Clarke ◽  
Fudong Li ◽  
Steven Furnell

Purpose The end-user has frequently been identified as the weakest link; however, motivated by the fact that different users react differently to the same stimuli, identifying the reasons behind variations in security behavior and why certain users could be “at risk” more than others is a step toward protecting and defending users against security attacks. This paper aims to explore the effect of personality trait variations (through the Big Five Inventory [BFI]) on users’ risk level of their intended security behaviors. In addition, age, gender, service usage and information technology (IT) proficiency are analyzed to identify what role and impact they have on behavior. Design/methodology/approach The authors developed a quantitative-oriented survey that was implemented online. The bi-variate Pearson two-tailed correlation was used to analyze survey responses. Findings The results obtained by analyzing 538 survey responses suggest that personality traits do play a significant role in affecting users’ security behavior risk levels. Furthermore, the results suggest that BFI score of a trait has a significant effect as users’ online personality is linked to their offline personality, especially in the conscientiousness personality trait. Additionally, this effect was stronger when personality was correlated with the factors of IT proficiency, gender, age and online activity. Originality/value The contributions of this paper are two-fold. First, with the aid of a large population sample, end-users’ security practice is assessed from multiple domains, and relationships were found between end-users’ risk-taking behavior and nine user-centric factors. Second, based upon these findings, the predictive ability for these user-centric factors were evaluated to determine the level of risk a user is subject to from an individual behavior perspective. Of 28 behaviors, 11 were found to have a 60 per cent or greater predictive ability, with the highest classification of 92 per cent for several behaviors. This provides a basis for organizations to use behavioral intent alongside personality traits and demographics to understand and, therefore, manage the human aspects of risk.


Author(s):  
Patrik T. Schuler ◽  
Katherina A. Jurewicz ◽  
David M. Neyens

Gestures are a natural input method for human communication and may be effective for drivers to interact with in-vehicle infotainment systems (IVIS). Most of the existing work on gesture-based human-computer interaction (HCI) in and outside of the vehicle focus on the distinguishability of computer systems. The purpose of this study was to identify gesture sets that are used for IVIS tasks and to compare task times across the different functions for gesturing and touchscreens. Task times for user-defined gestures were quicker than for a novel touchscreen. There were several functions that resulted in relatively intuitive gesture mappings (e.g., zooming in and zooming out on a map) and others that did not have strong mappings across participants (e.g., decreasing volume and playing the next song). The findings of this study suggest that user-centric gestures can be utilized to interact with IVIS systems instead of touchscreens, and future work should evaluate how to account for variability in intuitive gestures. Understanding the gesture variability among the end users can support the development of an in-vehicle gestural input system that is intuitive for all users.


Author(s):  
David Hailey

In the creation of online marketing sites, it is common for the site to be well underway before any writers are introduced to the project. Sometimes writers are not introduced to the project until the site is actually designed and developed, the writer expected to add content after the fact and to an alien architecture. In the case of complex information systems, sometimes no writer is involved at all. In this chapter, the authors do three things. First, they make the claim that there are three kinds of writing demanded by the Internet: user-centric, persuasion-centric, and quality-centric. Together, they make up a package called “reader-centric writing.” Furthermore, the authors suggest that in writing for the prosumer, quality-centric and persuasion-centric are as common and perhaps more important than user-centric, and a competent professional writer thoroughly immersed in the skills necessary for producing the full spectrum of reader-centric writing should be involved in the production of these texts from the very beginning of the project. Secondly, toward supporting the above argument, the authors present examples in Complex and Complicated Information Systems (CCISs) where developers with an incomplete understanding of the issues discussed produce egregious problems that go unnoticed for years. Finally, based on the above claims, the authors show how excellent writers are in position to make valuable contributions to content quality, metadata quality, landing page optimization, search engine optimization, and return on investment, particularly when producing Websites for audiences as demanding as prosumers.


Author(s):  
Jens H. Weber-Jahnke ◽  
Yury Bychkov ◽  
David Dahlem ◽  
Luay Kawasme

Many recently emerging component-based Web portal application platforms allow end users to compose dynamic Web dialogues on the fly. Experts predict that this paradigm will enable a class of new applications for Web-based content delivery in information-rich, agile business domains, such as health care. We present a conceptual analysis of the user-based composition paradigm currently used and argue that its usability is limited with respect to complex, dynamic applications. To overcome these limitations, we present an alternative composition paradigm, which is based on a semantic model of a portal’s application domain. We evaluate this approach with an application scenario in the health care domain.


2021 ◽  
Vol 9 ◽  
Author(s):  
Christopher Lauer ◽  
Joseph Conran ◽  
Jeffery Adkins

This paper describes the process, and lessons learned in a preliminary benefits study of a proposed infrared hyperspectral sounder (HSS) for NOAA’s next generation geostationary satellite program (GeoXO). The valuation of government-owned satellite systems providing a public good with a complex array of instruments is a nascent field of study. Many different sensor configurations are possible, but there are restrictions due to physical and budget constraints. Accounting for economic considerations during the design and planning phase for satellite constellations helps to ensure that the most cost effective instruments are selected. To assess whether the HSS instrument should be included on GeoXO, we applied a value of information approach and found the benefits associated with this instrument are likely to substantially outweigh the costs. Value of information studies often focus on data and information that has a direct use case. Estimating benefits for the HSS is especially challenging because data are not used directly by decision makers. Instead these data along with information from other Earth observing (EO) satellites play a key role in producing the inputs necessary for modern numerical hydrometeorological modeling. We describe strategies to assess the marginal (i.e., incremental) contribution of an instrument that is part of a complex information production process. We make several recommendations that, if implemented, would improve the quality of future studies of this kind. This includes (1) a systems approach to observing system planning, (2) improving the design of observing system experiments (OSSE and OSE), and (3) better tracking of the decisions and needs of end-users, especially those external to the agency.


2018 ◽  
Vol 9 (4) ◽  
pp. 15-33 ◽  
Author(s):  
Gitanjali Rahul Shinde ◽  
Henning Olesen

Internet of Things (IoT) applications can offer a great potential of benefits to end users. We are moving towards an Internet of People, Things and Services (IoPTS) and a future world of ambient intelligence, where users can seamlessly interact with IoT devices and get information about the services they offer. Interaction can take place directly or through dedicated mobile apps that are built to acquire data from sensors or clusters of IoT devices. The article presents a user-centric cluster framework, taking into account the resource-constrained nature of the IoT devices. As part of the framework, the authors propose a Mobility Aware Clustering Scheme (MACS), which organizes the IoT devices in clusters using a fitness function for each node, and a Profile Aware Proactive Cluster Discovery (PAPCD) mechanism using Bluetooth Low Energy (BLE) beacons for service advertisement. The authors also propose an IoT service filtering and ranking algorithm to match the users' preferences and requirements


Sign in / Sign up

Export Citation Format

Share Document