<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chun-Ta Li</style></author><author><style face="normal" font="default" size="100%">Jau-Ji Shen</style></author><author><style face="normal" font="default" size="100%">Yen-Ping Chu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges in E-Government and Security of Information</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Success</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">Factor</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">9-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to the advances made in Information and Communication Technologies (ICT), e-Government users can easily use the available services from places and at time that are convenient to them through WWW browsers. To easily and securely provide the required services through Information Technology (IT) has been an important issue in e-Government. In this article, the authors propose an explicit classification of e-Government applications and some challenges and obstacles in e-Government considered from four perspectives. Finally, a comprehensive view of some critical success factors in e-Government is proposed.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yi-Hui CHEN</style></author><author><style face="normal" font="default" size="100%">Eric Jui-Lin LU</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Design of a Secure Fine-Grained Official Document Exchange Model for E-Government</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Document Exchange.</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">XML Encryption</style></keyword><keyword><style  face="normal" font="default" size="100%">XML Signature</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">55-71</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">At present, the exchange of information via Internet is widely used in electronic government (e-Government). To securely and effectively exchange offi¬cial documents among government agencies, an exchange model has been devel¬oped by the government of Taiwan. Although a RSA cryptosystem is used in the model to ensure security and XML is employed to increase interoperability, the cur¬rent design does not take advantage of the rich structure of the XML documents, and it may result in possible security leaks due to the fact that, traditionally, the whole document is signed and encrypted. Considering the characteristic that it is easy to integrate encryption, signature and access control into XML documents, a fine-grained official document exchange model for e-Government is proposed in this article. In addition, the proposed model conforms to standards such as XML Encryption and XML Signature.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hsien-Chu Wu</style></author><author><style face="normal" font="default" size="100%">Chwei-Shyong Tsai</style></author><author><style face="normal" font="default" size="100%">Ching-Hao Lai</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A License Plate Recognition System in e-Government</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Character Segmentation</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">License Plate Recognition</style></keyword><keyword><style  face="normal" font="default" size="100%">Plate Detection</style></keyword><keyword><style  face="normal" font="default" size="100%">Traffic Control.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">199-210</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In recent years, there has been a lot of research in license plate recognition, and many license plate recognition systems have been proposed and used. In the past, the license plate recognition system was a key element in many applications such as traffic control and parking lots access control. In this article, the authors present current research in license plate recognition, and elaborate on the use of license plate recognition in e-Government. License plate recognition involves three main components: plate detection, character segmentation and character recognition. The authors consider all three components and thoroughly deal with the issue how to apply license plate recognition in e-Government in order to improve performance.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Georgi Pavlov</style></author><author><style face="normal" font="default" size="100%">Veselina Aleksandrova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">E-Tender - An Approach for Ensuring Transparency  in Defence Budget Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">defence policy</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">Electronic tender</style></keyword><keyword><style  face="normal" font="default" size="100%">information technology impact</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet online application</style></keyword><keyword><style  face="normal" font="default" size="100%">public procurement</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">148-162</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The authors present a software product development in support of conducting of electronic tenders (“e-Tender”). The product may be implemented in accordance with the purposes of the Law on Public Tenders - the law that establishes terms and procedures for public procurement. E-Tender will facilitate transparency of defence policy concerning planning and budgeting processes - one of the main objectives of Partnership for Peace programme. This article considers the e-tender not only as an Internet on-line application for improving transparency of defence management but also as a decision support tool.
The following objectives are achieved through successful realization of a public web site for electronic submission of documents: increased public access and transparency of tenders; confidentiality of any company information provided; and confidentiality of proposals made by the prospective contractors. Each participant, through specialized programmes called agents, is able to ask for the opinion of “independent” experts (for example, experts from foreign centres for analyses and prognoses) and to add to the database of potential project contractors. Another advantage is that the possibility to create a database for those companies that have successfully executed contracts, as well for companies that have had significant problems in meeting the customers’ expectations. The software realization of such tenders would also provide excellent opportunities for accelerating the execution of urgent requests, for example, procurement of perishable products. In addition, an interested observer would be able to check what were the criteria and the method of analysis chosen by a contractor. As a whole, the transparency of public procurement relates closely to the widely discussed issues of e-Government.</style></abstract></record></records></xml>