Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.20180401.pre
Volume 5
Eugenie de Silva
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040101
Volume 5
K.Y.B. Williams, Jimmy A.G. Griffin
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include...
Show More
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Williams, K.Y.B., and Jimmy A.G. Griffin. "Better Security and Encryption Within Cloud Computing Systems." IJPADA vol.5, no.2 2018: pp.1-11. http://doi.org/10.4018/IJPADA.2018040101
APA
Williams, K. & Griffin, J. A. (2018). Better Security and Encryption Within Cloud Computing Systems. International Journal of Public Administration in the Digital Age (IJPADA), 5(2), 1-11. http://doi.org/10.4018/IJPADA.2018040101
Chicago
Williams, K.Y.B., and Jimmy A.G. Griffin. "Better Security and Encryption Within Cloud Computing Systems," International Journal of Public Administration in the Digital Age (IJPADA) 5, no.2: 1-11. http://doi.org/10.4018/IJPADA.2018040101
Export Reference
Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040102
Volume 5
Tianxing Cai
In this article, the current application of information technology in the energy infrastructure security will be introduced. The digital system can help us to identify the framework of energy...
Show More
In this article, the current application of information technology in the energy infrastructure security will be introduced. The digital system can help us to identify the framework of energy infrastructure security, characterize the energy network, generate the strategy of self-recovery and handle the uncertainty of identified damage. It will also integrate the comprehensive evaluation of population distribution, roadway safety, the constraint of transportation routes, transportation capacity and capability for the optimal emergency response planning with the minimal potential impact to the community for the management of intelligent and secure energy infrastructure.
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040103
Volume 5
George Platsis
This article presents a cross spectrum of issues where the cyber domain is impacted by human decision making. Technical efforts and solutions are not enough. Therefore, until personal awareness of...
Show More
This article presents a cross spectrum of issues where the cyber domain is impacted by human decision making. Technical efforts and solutions are not enough. Therefore, until personal awareness of the cyber domain improves, we will be no closer to solving this great challenge of our time.
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040104
Volume 5
Falko Walther, Patrick Weber, Rüdiger Kabst
Understanding the general linkage between citizens' political efficacy and their satisfaction with and trust in local administrative units is essential to understand the consequences of...
Show More
Understanding the general linkage between citizens' political efficacy and their satisfaction with and trust in local administrative units is essential to understand the consequences of administrative decision-making. This article offers a SEM approach that shows how citizens' political efficacy, i.e. through secure e-Government services, affects satisfaction with and trust in their administrative units. The authors present initial insights into the effects of political efficacy on citizens' satisfaction with and trust in their local administrative units. They show that a high perceived feeling of being able to influence administrative and political work within a local environment increases citizens' evaluations of both satisfaction and trust.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Walther, Falko, et al. "Analyzing Influencing Factors on Citizens' Trust and Satisfaction." IJPADA vol.5, no.2 2018: pp.40-51. http://doi.org/10.4018/IJPADA.2018040104
APA
Walther, F., Weber, P., & Kabst, R. (2018). Analyzing Influencing Factors on Citizens' Trust and Satisfaction. International Journal of Public Administration in the Digital Age (IJPADA), 5(2), 40-51. http://doi.org/10.4018/IJPADA.2018040104
Chicago
Walther, Falko, Patrick Weber, and Rüdiger Kabst. "Analyzing Influencing Factors on Citizens' Trust and Satisfaction," International Journal of Public Administration in the Digital Age (IJPADA) 5, no.2: 40-51. http://doi.org/10.4018/IJPADA.2018040104
Export Reference
Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040105
Volume 5
Galit Margalit Ben-Israel
This article deals with citizen engagement and public participation being in crisis on the Israeli home front, in the era of Web 2.0. Since 2004, Web 2.0 characterizes changes that allow users to...
Show More
This article deals with citizen engagement and public participation being in crisis on the Israeli home front, in the era of Web 2.0. Since 2004, Web 2.0 characterizes changes that allow users to interact and collaborate with each other in a social media dialogue as creators of user-generated content in social networking sites: Facebook, Twitter, blogs, wikis, YouTube, hosted services, applications, WhatsApp, etc. Since 2006, Israel is involved in asymmetric conflicts. The research defines the impact of Web 2.0 on public engagement in the Israeli home front. The case studies examined in the research are: 1) The 2006 Lebanon War (July-August 2006); 2) The Gaza War (27 December 2008 and ended on 18 January 2009); 3) Operation Pillar of Defense (November 2012); and 4) The 2014 Israel–Gaza conflict.
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJPADA.2018040106
Volume 5
Maryam Al-Jamal, Emad Abu-Shanab
This article takes a deeper look into the related concepts and issues of open government, its benefits and challenges and some related processes. Also, this article tries to identify the line...
Show More
This article takes a deeper look into the related concepts and issues of open government, its benefits and challenges and some related processes. Also, this article tries to identify the line between government transparency and people's privacy under the open government initiatives, by exploring transparency and privacy in more details. Finally, the authors propose a framework that depicts the premise related to this topic.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Al-Jamal, Maryam, and Emad Abu-Shanab. "Open Government: The Line between Privacy and Transparency." IJPADA vol.5, no.2 2018: pp.64-75. http://doi.org/10.4018/IJPADA.2018040106
APA
Al-Jamal, M. & Abu-Shanab, E. (2018). Open Government: The Line between Privacy and Transparency. International Journal of Public Administration in the Digital Age (IJPADA), 5(2), 64-75. http://doi.org/10.4018/IJPADA.2018040106
Chicago
Al-Jamal, Maryam, and Emad Abu-Shanab. "Open Government: The Line between Privacy and Transparency," International Journal of Public Administration in the Digital Age (IJPADA) 5, no.2: 64-75. http://doi.org/10.4018/IJPADA.2018040106
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJPADA should be directed to the attention of:
Submission-Related InquiriesManuel Pedro Rodríguez Bolívar
Editor-in-Chief
International Journal of Public Administration in the Digital Age (IJPADA)
E-mail:
manuelp@ugr.esAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100