Searched for: +
(1 - 20 of 62)

Pages

document
Tambouris, E. (author), Scholl, H.J. (author), Janssen, M.F.W.H.A. (author), Wimmer, M.A. (author), Tarabanis, K. (author), Gascó, M. (author), Klievink, A.J. (author), Lindgren, I. (author), Milano, M. (author), Panagiotopoulos, P. (author), Pardo, T.A. (author), Parycek, P. (author), Sæbø, O. (author)
Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies. This book presents papers from the 14th International Federation for Information Processing’s EGOV conference (IFIP EGOV 2015),...
book 2015
document
Klievink, A.J. (author), Zuiderwijk-van Eijk, A.M.G. (author), Janssen, M.F.W.H.A. (author)
Public and private organizations in various areas are setting up digital Information Infrastructures (IIs) for interconnecting government, businesses and citizens. IIs can create value by sharing and integrating data of multiple ac-tors. This can be the basis for value added services and especially collaborations of public and private partners...
book chapter 2014
document
Van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design science approach to develop an software...
book chapter 2016
document
Helbig, N. (author), Dawes, S. (author), Dzhusupova, Z. (author), Klievink, A.J. (author), Mkude, C.G. (author)
This chapter provides a starting point for better understanding how different approaches, tools, and technologies can support effective stakeholder participation in policy development. Participatory policy making involves stakeholders in various stages of the policy process and can focus on both the substance of the policy problem or on...
book chapter 2015
document
Klievink, A.J. (author)
Collaboration between the public and the private sector is seen as an instrument to make governance smarter, more effective, and more efficient. However, whereas there is literature on public-private collaboration, very little of it addresses how these collaborations can be shaped to make use of the huge potential that technological innovations...
book chapter 2015
document
Deljoo, A. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Public-private service networks (PPSN) consist of social and technology components. Development of PPSN is ill-understood as these are dependent on a complex mix of interactions among stakeholders and their technologies and is influenced by contemporary developments. The aim of this paper is to advance our understanding of PPSN by modeling its...
conference paper 2013
document
Klievink, A.J. (author), Lucassen, I. (author)
One of the key challenges that governments face in supervising international supply chains is the need for improving the quality of data accompanying the logistics flow. In many supply chains, individual parties in the chain work with low quality data for their operations and compliance, even though somewhere in the supply chain, better data is...
conference paper 2013
document
Klievink, B. (author), Janssen, M.F.W.H.A. (author)
Governments aim to improve service delivery to citizens and businesses and need to transform to accomplish efficiency savings and better customer orientation. This requires the coordination of dependencies among the various departments located in the frontend and backend of organizations, and might include interdependencies with external parties...
conference paper 2010
document
Lucassen, I. (author), Klievink, A.J. (author), Tavasszy, L.A. (author)
One of the key challenges that international supply chains face today is the need for improving the quality of the data that is used for business operations and compliance. In many supply chains, individual parties in the chain work with low quality data, even though somewhere in the chain, better data is available. The systems of supply chain...
conference paper 2014
document
Van Stijn, E.J. (author), Klievink, A.J. (author), Janssen, M.F.W.H.A. (author), Tan, Y. (author)
Government agencies and businesses cooperate and invest heavily to achieve reliable and secure global supply networks. A so-called data pipeline, which integrates data from various parties in the supply chain and incorporates data from new tracking and monitoring technologies, would enable real-time data management for businesses. This IT...
conference paper 2012
document
Singerling, T. (author), Klievink, A.J. (author), De Reuver, G.A. (author), Janssen, M.F.W.H.A. (author)
Organizations do not just decide on whether or not to exchange information digitally. In many cases, there are multiple alternative configurations of inter-organizational systems (IOS) that facilitate such information sharing. Although a lot is known about the factors that influence whether organizations do or do not adopt IOS, little is known...
conference paper 2015
document
Klievink, B. (author), Zomer, G. (author)
This paper is the introduction to the fourth Workshop on IT-enabled Resilient, Seamless and Secure Global Supply Chains (WITNESS 2015). In the paper, we present a synthesis of the innovation agendas of a series of international research, development and demonstration projects that seek to make supply chains more efficient and more secure. From...
conference paper 2015
document
Singerling, T. (author), Klievink, A.J. (author), De Reuver, G.A. (author), Janssen, M.F.W.H.A. (author)
Organizations do not just decide on whether or not to exchange information digitally. In many cases, there are multiple alternative configurations of inter-organizational systems (IOS) that facilitate such information sharing. Although a lot is known about the factors that influence whether organizations do or do not adopt IOS, little is known...
conference paper 2015
document
Bouwman, X.B. (author), Griffioen, Harm (author), Egbers, Jelle (author), Doerr, Christian (author), Klievink, Bram (author), van Eeten, M.J.G. (author)
Commercial threat intelligence is thought to provide unmatched coverage on attacker behavior, but it is out of reach for many organizations due to its hefty price tag. This paper presents the first empirical assessment of the services of commercial threat intelligence providers. For two leading vendors, we describe what these services consist of...
conference paper 2020
document
Zhilin, S. (author), Klievink, A.J. (author), de Jong, W.M. (author)
Citizens interested in the democratization of urban development processes experiment with the co-creation of public spaces. Some of them collect, improve, and share design blueprints and manuals of their projects on the internet with help of free and open source tools. As a result, they produce open source design manuals that can be used freely,...
conference paper 2018
document
Klievink, A.J. (author), Neuroni, Alessia (author), Fraefel, Marianne (author), Zuiderwijk-van Eijk, A.M.G. (author)
In recent years, many countries have started to draft strategies and policies related to the data economy. To support new data- driven activities and innovations, the development of a national data infrastructure (NDI) is seen as key. The concept of NDI has entered governmental strategic discussions on data as an asset, the role of data...
conference paper 2017
document
Klievink, A.J. (author)
Collaboration between the public and the private sector is seen as an instrument to make governance smarter, more effective, and more efficient. However, whereas there is literature on public-private collaboration, very little of it addresses how these collaborations can be shaped to make use of the huge potential that technological innovations...
conference paper 2015
document
van Wegberg, R.S. (author), Tajalizadehkhoob, S. (author), Soska, Kyle (author), Akyazi, U. (author), Hernandez Ganan, C. (author), Klievink, A.J. (author), Christin, Nicolas (author), van Eeten, M.J.G. (author)
Researchers have observed the increasing commoditization of cybercrime, that is, the offering of capabilities, services, and resources as commodities by specialized suppliers in the underground economy. Commoditization enables outsourcing, thus lowering entry barriers for aspiring criminals, and potentially driving further growth in cybercrime....
conference paper 2018
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author), Tan, Y. (author), Rukanova, B.D. (author)
Business-to-government (B2G) information sharing can benefit government organisations, as well as businesses. Yet, businesses are often reluctant to share, as data sharing might not just provide benefits but also entails risks. Therefore, a system supporting B2G information sharing should provide the appropriate level of openness, such that the...
conference paper 2018
document
van Wegberg, R.S. (author), Miedema, F.E.G. (author), Akyazi, U. (author), Noroozian, A. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their business model, leading them to outsource these parts to specialized criminal vendors. Online anonymous markets, from Silk Road to AlphaBay, have been used to search for these products and contract with their criminal vendors. While one listing of...
conference paper 2020
Searched for: +
(1 - 20 of 62)

Pages