![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches,malware detection and prevention, network and host intrusion detection and prevention, intrusion detection for mobile devices, and high-performance intrusion det- tion. Furthermore, there was a poster session on emerging research areas and case studies. The RAID 2009ProgramCommittee received59 full paper submissionsfrom all over the world. All submissions were carefully reviewed by independent - viewers on the basis of space, topic, technical assessment, and overall balance. The ?nal selection took place at the Program Committee meeting on May 21 in Oakland, California. In all, 17 papers were selected for presentation and p- lication in the conference proceedings. As a continued feature, the symposium accepted submissions for poster presentations which have been published as - tended abstracts, reporting early-stage research, demonstration of applications, or case studies. Thirty posters were submitted for a numerical review by an independent, three-person sub-committee of the Program Committee based on novelty, description, and evaluation. The sub-committee recommended the - ceptance of 16 of these posters for presentation and publication. The success of RAID 2009 depended on the joint e?ort of many people.
This book constitutes the refereed proceedings of the 4th European Conference on Technology Enhanced Learning, EC-TEL 2009, held in Nice, France in September/October 2009. The 35 revised full papers, 17 short papers, and 35 posters presented were carefully reviewed and selected from 136 paper submissions and 22 poster submissions. The papers are organized in topical sections on adaptation and personalization, interoperability, semantic Web, Web 2.0., data mining and social networks, collaboration and social knowledge construction, learning communities and communities of practice, learning contexts, problem and project-based learning, inquiry, learning, learning design, motivation, engagement, learning games, and human factors and evaluation.
Welcome to the proceedings of the 9th International Conference on Intelligent Virtual Agents, held September 14-16, 2009 in Amsterdam, The Netherlands. Intelligent virtual agents (IVAs) are interactive characters that exhibit hum- like qualities and communicate with humans or with each other using natural human modalities such as speech and gesture. They are capable of real-time perception, cognition and action, allowing them to participate in a dynamic physical and social environment. IVA is an interdisciplinary annual conference and the main forum for p- senting research on modeling, developing and evaluating IVAs with a focus on communicative abilities and social behavior. The development of IVAs requires expertise in multimodal interaction and several AI ?elds such as cognitive m- eling, planning, vision and natural language processing. Computational models are typically based on experimental studies and theories of human-human and human-robot interaction; conversely, IVA technology may provide interesting lessons for these ?elds. The realization of engaging IVAs is a challenging task, so reusable modules and tools are of great value. The ?elds of application range from robot assistants, social simulation and tutoring to games and artistic - ploration.
In this exceptional study, Christian Fuchs discusses how the internet has transformed the lives of human beings and social relationships in contemporary society. By outlining a social theory of the internet and the information society, he demonstrates how the ecological, economic, political, and cultural systems of contemporary society have been transformed by new ICTs. Fuchs highlights how new forms of cooperation and competition are advanced and supported by the internet in subsystems of society and also discusses opportunities and risks of the information society.
Many challenges were identified in CSCW some thirty years ago, and some of these remain problematic today. However they are being progressively transformed and this edited volume contains contributions that demonstrate how these new challenges are being dealt with in a variety of ways, reflecting the balance of rigour and creativity that has always characterised the field. Originally presented at COOP 08 which took place in Carry-le-Rouet, France in 2008, the contributions to this volume have been substantially extended and revised. New technologies, new domains and new methods are described for supporting design and evaluation. Taking a progressive and critical stance, the authors cover a variety of themes including inter-organisational working, non task-based environments, creativity, and the development of Web 2.0 (and even Web 3.0) applications, including new cooperative mechanisms and new classification possibilities."
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs
This volume contains the papers presented at the Second International Sym- sium on Algorithmic Game Theory (SAGT 2009), which was held on October 18-20, 2009, in Paphos, Cyprus. This event followed the ?rst, very successful SAGT symposium, which took place in Paderborn, Germany, last year. The purpose of SAGT is to bring together researchers from computer s- ence, economics and mathematics to present and discuss originalresearchat the intersection of algorithms and game theory. It has been intended to cover all important areas such as solution concepts, game classes, computation of equil- riaandmarketequilibria, algorithmicmechanismdesign, automatedmechanism design, convergenceandlearningingames, complexityclassesingametheory, - gorithmicaspectsof?xed-pointtheorems, mechanisms, incentivesandcoalitions, cost-sharing algorithms, computational problems in economics, ?nance, decision theory and pricing, computational social choice, auction algorithms, price of - archyand its relatives, representationsof games and their complexity, economic aspects of distributed computing and the internet, congestion, routing and n- work design and formation games and game-theoretic approaches to networking problems. Approximately55submissionstoSAGT2009 werereceived.Eachsubmission was reviewed by at least three Program Committee members. The Program Committee decided to accept 29 papers. Out of these, a small number will be invited to a Special Issue of the Theory of Computing Systems journal with selected papers from SAGT 2009. The program of SAGT 2009 featured three invited talks from three outstanding researchers in algorithmic game theory: Elias Koutsoupias, Dov Monderer and Mihalis Yannakakis. We are very grateful toElias, DovandMihalisforjoiningusinPaphosandfortheirexcellentl
Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in technology adoption and how to design human-computer interfaces for a competitive global market.
With the widespread interest in digital entertainment and the advances in the technologies of computer graphics, multimedia and virtual reality technologies, the new area of "Edutainment" has been accepted as a union of education and computer entertainment. Edutainment is recognized as an effective way of learning through a medium, such as a computer, software, games or AR/VR applications, that both educates and entertains. The Edutainment conference series was established and followed as a special event for the new interests in e-learning and digital entertainment. The main purpose of Edutainment conferences is the discussion, presentation, and information exchange of scientific and technological developments in the new community. The Edutainment conference series is a very interesting opportunity for researchers, engineers, and graduate students who wish to communicate at these international annual events. The conference series includes plenary invited talks, workshops, tutorials, paper presen- tion tracks, and panel discussions. The Edutainment conference series was initiated in Hangzhou, China in 2006. Following the success of the first (Edutainment 2006 in Hangzhou, China), the second (Edutainment 2007 in Hong Kong, China), and the third events (Edutainment 2008 in Nanjing, China), Edutainment 2009 was held August 9-11, 2009 in Banff, Canada. This year, we received 116 submissions from 25 different countries and regions - cluding Austria, Canada, China, Denmark, Finland, France, Germany, Greece, Hong Kong, Italy, Japan, Korea, Malaysia, Mexico, The Netherlands, Norway, Portugal, Singapore, Spain, Sweden, Switzerland, Taiwan, Trinidad and Tobago, UK, and USA.
These proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL- embourgduring September 7-8,2009, hostedbythe Universityof Luxembourg. VoteID 2009 built on the success of the 2007 edition held in Bochum. Events have moved on dramatically in the intervening two years: at the time of writing, people are in the streets of Tehran protesting against the claimed outcome of the June12thpresidentialelectionin Iran.Banners bearingthe words"Whereis my vote?" bear testimony to the strength of feeling and the need for elections to be trusted. These events show that the search for high-assurance voting is not a purely academic pursuit but one of very real importance. We hope that VoteID 2009 will help contribute to our understanding of the foundations of democracy. TheProgramCommitteeselected11papersforpresentationattheconference out of a total of 24 submissions. Each submission was reviewed by at least four Program Committee members. The EasyChair conference management system proved instrumental in the reviewing process as well as in the preparation of these proceedings. The selected papers cover a wide range of aspects of voting: proposals for high-assurancevotingsystems, evaluationofexistingsystems, assessmentofp- lic response to electronic voting and legal aspects. The program also included a keynote by Mark Ryan.
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu
COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second European conference in the field of Computer Supported Cooperative Work after ECSCW. The conference brings together researchers who contribute to the analysis and design of cooperative systems and their integration in organizational community, public and other settings, and their implications for policy and decision making. Cooperative systems design requires a deep understanding of collective activities, involving both artifacts and social practices. Contributions are solicited from a wide range of domains contributing to the fields of cooperative systems design and evaluation: CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agents, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics.
The 13th International Conference on Human-Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19-24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human-Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human Centered Design. A total of 4,348 individuals from academia, research institutes, industry and gove- mental agencies from 73 countries submitted contributions, and 1,397 papers that were judged to be of high scientific quality were included in the program. These papers - dress the latest research and development efforts and highlight the human aspects of the design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The UIC 2009 conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. The conference was also sponsored by the Australian Centre of - cellence in Information and Communication Technologies (NICTA). UIC 2009 was accompanied by six workshops on a variety of research challenges within the area of ubiquitous intelligence and computing. The conference was held in Brisbane, Australia, July 7-9, 2009. The event was the sixth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (Second International Symposium on Ubiquitous Intelligence and Smart Worlds) held in December 2005 in Japan. Since 2006, the conference has been held annually under the name UIC (International Conference on Ubiquitous Intelligence and Computing). UIC 2006 was held in September 2006 in Wuhan andThreeGorges, China, followedbyUIC2007heldinJuly2007inHongKong, and UIC 2008 held in June 2008 in Oslo, Norway. Ubiquitous sensors, computers, networksand informationare paving the way towardasmartworldinwhichcomputationalintelligenceisdistributedthrou- out the physical environment to provide reliable and relevant services to peop
This book constitutes the proceedings of the First International Conference on User Modeling, Adaptation, and Personalization, held in Trento, Italy, on June 22-26, 2009. This annual conference was merged from the biennial conference series User Modeling, UM, and the conference on Adaptive Hypermedia and Adaptive Web-Based Systems, AH. The 53 papers presented together with 3 invited talks were carefully reviewed and selected from 125 submissions. The tutorials and workshops were organized in topical sections on constraint-based tutoring systems; new paradigms for adaptive interaction; adaption and personalization for Web 2.0; lifelong user modeling; personalization in mobile and pervasive computing; ubiquitous user modeling; user-centered design and evaluation of adaptive systems.
Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.
This volume contains the proceedings of the Third KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2009)--held at Uppsala University in Sweden during June 3-5, 2009. The symposium was organized by Uppsala University, KES International and its Focus Group on Agent and Multi-agent Systems. The KES-AMSTA Symposium series is a sub-series of the KES Conference series. Following the successes of the First KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2007), held in Wroclaw, Poland, from May 31 to 1 June 2007--and the Second KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2008) held in Incheon, Korea, March 26-28, 2008--KES-AMSTA 2009 featured keynote talks, oral and poster presentations, and a number of workshops and invited sessions, closely aligned to the themes of the conference. The aim of the symposium was to provide an international forum for scientific - search into the technologies and applications of agent and multi-agent systems. Agent and multi-agent systems are an innovative type of modern software system and have long been recognized as a promising technology for constructing autonomous, c- plex and intelligent systems. A key development in the field of agent and multi-agent systems has been the specification of agent communication languages and formali- tion of ontologies. Agent communication languages are intended to provide standard declarative mechanisms for agents to communicate knowledge and make requests of each other, whereas ontologies are intended for conceptualization of the knowledge domain.
Starting in the late 1980s, the CAiSE series of conferences has established a platform for presenting and exchanging results of design-oriented research in - formation systems. In addition to the presentation of new information systems techniques, recent years have seen the rise of empirical validation of such te- niques. There is also increasing attention for industry participation. The 21st CAiSE conference, held in Amsterdam, The Netherlands, during June 8-12, 2009, continued this tradition. The theme of CAiSE 2009 was "Information Systems for Business Innova- on." Due to the widespread use of the Web, businesses innovate their propo- tions to customers and come up with new IT-enabled services. Such innovation requires understanding of business and technology in an integrated way. Mul- disciplinary research areas such as service science, networked enterprises, and social networking are paying attention to IT and business innovation. This t- me wasevidentbothinthe pre-conferenceworkshopsandinthe invitedspeakers of the conference. The ?rst two days consisted of pre-conference workshops on business process modelling, modelling methods, requirements engineering, organizational mod- ling, interoperabilityandcooperation, the knowledgeindustry, ontologies, gov- nance, Web information systems, business-IT alignment, legal aspects, systems of things and domain engineering. The conference proper was combined with a doctoralconsortiumwherePhDstudentscouldpresentanddiscusstheirresearch plans and with an industrial event with presentations and exhibitions. Four invited speakers shed light on the role of ontologies in business, p- cess mining, business networking and IT entrepeneurship. Highlights of the conference included a concert and dinner in the world-famous Concertgebouw building and a reception in the Muziekgebouw aan het IJ in Amsterdam harbor.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.
We are extremely pleased to present a comprehensive book comprising a collection of research papers which is basically an outcome of the Second IFIP TC 13.6 Working Group conference on Human Work Interaction Design, HWID2009. The conference was held in Pune, India during October 7-8, 2009. It was hosted by the Centre for Development of Advanced Computing, India, and jointly organized with Copenhagen Business School, Denmark; Aarhus University, Denmark; and Indian Institute of Technology, Guwahati, India. The theme of HWID2009 was Usability in Social, C- tural and Organizational Contexts. The conference was held under the auspices of IFIP TC 13 on Human-Computer Interaction. 1 Technical Committee TC13 on Human-Computer Interaction The committees under IFIP include the Technical Committee TC13 on Human-Computer Interaction within which the work of this volume has been conducted. TC13 on Human-Computer Interaction has as its aim to encourage theoretical and empirical human science research to promote the design and evaluation of human-oriented ICT. Within TC13 there are different working groups concerned with different aspects of human- computer interaction. The flagship event of TC13 is the bi-annual international conference called INTERACT at which both invited and contributed papers are presented. Contributed papers are rigorously refereed and the rejection rate is high.
This book constitutes the refereed proceedings of the 7th International Conference On Smart Homes and and Health Telematics, ICOST 2009, held in Tours, France, in July 2009. The 27 revised full papers and 20 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cognitive assistance and chronic diseases management; ambient living systems; service continuity and context awareness; user modeling and human-machine interaction; ambient intelligence modeling and privacy issues, human behavior and activities monitoring.
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the emerging challenges of investigation as new devices enter the market. These - clude the impact of solid-state memory, ultra-portable devices, and distributed storage - also known as cloud computing. The plenary session on Digital Forensics Practice included Troy O'Malley, Que- sland Police Service, who outlined the paperless case file system now in use in Que- sland, noting that efficiency and efficacy gains in using the system have now meant that police can arrive at a suspect's home before the suspect! Joseph Razik, represe- ing Patrick Perrot of the Institut de Recherche Criminelle de la Gendarmerie Nati- ale, France, summarized research activities in speech, image, video and multimedia at the IRCGN. The plenary session on The Interaction Between Technology and Law brought a legal perspective to the technological challenges of digital forensic investigation.
The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.
This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary approach demonstrates that information technology is more than a tool for politicians and policy-makers. E-government has reconfigured public administration, policy, power and citizenship. |
![]() ![]() You may like...
Numerology For The Beginner - Master the…
Michelle Northrup
Hardcover
|