Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. Th...Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. This paper identifies quality attributes that are required to assess the quality of an e-government website, which should be considered by developers during the development of e-government applications. The primary goals are identifying, qualifying, categorizing, and ranking these factors, and then defining the interrelations among these quality factors.展开更多
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.展开更多
The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common ci...The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common citizens is recognized as one of the major setbacks of e-government development in both developed and developing countries. Moreover, government agencies in these countries are facing great challenges in keeping the citizens motivated enough to continue to use e-government services. This research aims to investigate the factors that influence citizens’ trust towards continue use of e-government services in Cameroon. The proposed research model consisted of three main constructs including technological, governmental, risk factors as well as six demographic characteristics (age, gender, educational level, income, internet experience and cultural perception). A five-point Likert scale questionnaire was designed to collect data physically and electronically, 352 valid questionnaires were retrieved. Simple and Multiple regression analysis methods were applied to build an adequate model based on the verification of hypotheses proposed. Based on results obtained, four demographic characteristics (age, education, occupation and income) have influence on citizens’ trust in e-government meanwhile gender and cultural affiliation have no influence. Furthermore, technological factors and governmental factors positively influence trust level in e-government, whereas risk factors have a negative influence on trust level. Deducing from the results, a list of recommendations is proposed to the government of Cameroon in order to reinforce citizens’ trust in e-government services.展开更多
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.展开更多
In recent years,the telecommunications sector is no longer limited to traditional communications,but has become the backbone for the use of data,content and digital applications by individuals,governments and companie...In recent years,the telecommunications sector is no longer limited to traditional communications,but has become the backbone for the use of data,content and digital applications by individuals,governments and companies to ensure the continuation of economic and social activity in light of social distancing and total closure inmost countries in the world.Therefore,electronic government(e-Government)andmobile government(m-Government)are the results of technological evolution and innovation.Hence,it is important to investigate the factors that influence the intention to use m-Government services among Jordan’s society.This paper proposed a new m-Government acceptance model in Jordan(AMGS);this model combines the Information System(IS)Success Factor Model and Hofstede Cultural Dimensions Theory.The study was conducted by surveying different groups of the Jordanian community.Astructured questionnaire was used to collect data from203 respondents.Multiple regression analysis has been conducted to analyze the data.The results indicate that the significant predictors of citizen intention to use m-Government services in Jordan are Information Quality,Service Quality,Uncertainty Avoidance,and Indulgence vs.restraint.While,the results also suggest that Power Distance is not a significant predictor of citizen intention to use m-Government services.展开更多
Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such atta...Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.展开更多
For exchanging and sharing information and services in e-government, a framework of information service platform (ISP) is presented. The multi-layer architecture of the ISP is introduced. They are. user's requirem...For exchanging and sharing information and services in e-government, a framework of information service platform (ISP) is presented. The multi-layer architecture of the ISP is introduced. They are. user's requirement layer, business service layer, business process layer, business function layer and data layer. The lower layers are based on the architecture of web services and the upper layers are related to the institutional and organizational issues. In order to deal with the variation of user's requirements and changing environment, the matching and mapping processes with adaptive mechanism are illustrated.展开更多
Over the past years, many businesses, government and individuals have been started to adopt the internet and web-based technologies in their works to take benefits of costs reduction and better utilization of existing...Over the past years, many businesses, government and individuals have been started to adopt the internet and web-based technologies in their works to take benefits of costs reduction and better utilization of existing resources. The cloud computing is a new way of computing which aims to provide better communication style and storage resources in a safe environment via the internet platform. The E-governments around the world are facing the continued budget challenges and increasing in the size of their computational data so that they need to find ways to deliver their services to citizens as economically as possible without compromising the achievement of desired outcomes. Considering E-government is one of the sectors that is trying to provide services via the internet so the cloud computing can be a suitable model for implementing E-government architecture to improve E-government efficiency and user satisfaction. In this paper, the adoption of cloud computing strategy in implementing E-government services has been studied by focusing on the relationship between E-government and cloud computing by listing the benefits of creation E-government based on cloud computing. Finally in this paper, the challenges faced the implementation of cloud computing for E-government are discussed in details. As a result from understanding the importance of cloud computing as new, green and cheap technology is contributed to fixing and minimizing the existing problems and challenges in E-government so that the developed and developing countries need to achieve E-government based on cloud computing.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a m...Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a model of citizen trust in e-government in an effort to study the impacts of trust-related factors on citizen intentions to adopt e-government services.Design/methodology/approach:The data was collected from an online survey of 182Chinese users who had more than 3 years' online experiences of using government websites.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that trust in e-government,perceived usefulness and perceived ease of use are critical factors that influence citizen intentions to use e-government services.The study findings also indicate that citizen trust in e-government is positively associated with trust in government,institution-based trust and perceived usefulness of e-government services.Research limitations:The survey sampled adults aged from 25 to 35 years old.Such a limited sample group cannot represent all of the population.So a larger sample involving more experienced online users will yield more useful results.Practical implications:The study results will help government agencies,especially the Chinese government agencies,find ways to improve the Chinese citizens' trust in e-government and promote their adoptions of e-government services.Originality/value:Previous researches have investigated separately the impacts of user evaluation of government websites and user trust in e-government on user intentions to engage in e-government.This study makes a theoretical contribution by integrating these two perspectives and building a model of citizen trust in e-government in understanding the impacts of trust-related factors on citizens' adoptions of e-government initiatives.展开更多
We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornog...We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornographic webpages with the following major advantages: 1) a weighted window-based technique was proposed to estimate for the condition of concept drift for the keywords found recently in pornographic webpages; 2) checking only contexts of webpages without scanning pictures; 3) an incremental learning mechanism was designed to incrementally update the pornographic keyword database.展开更多
Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Meth...Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Methods: The documental quality of the 389 websites was estimated based upon the following parameters: 1) a combination of quality criteria from the Health Information Locator (LIS—OPS/BIREME) and those from Chile’s Pontifical Catholic University, organized into 17 variables;2) uniformity of reference criteria (Vancouver);3) association between the presence of authorship and a higher number of the quality criteria being fulfilled. We also studied the ranking of the results presented by Google in addition to attributes connected to the websites’ target audience, the types of content, their sponsors and country of origin. Results: Of the 389 websites studied, 111 links were not active (28.53% CI 95% [24.05 - 33.02]) and none of the websites in the sample met all of the 17 quality variables. Authored websites displayed remarkable differences in quality when compared to those which did not identify their authors. Conclusions: Faced with the issue of the proliferation of websites with questionable quality content, and the fact that the ranking of results interferes directly in the internal evaluation of content relevance, we propose that public-health research institutions cooperate with web-searching developers to improve the website-positioning formula, in which the “identified authorship” criterion should play a major role in the ranking system.展开更多
The paper introduces a new approach, that is, semantic Web techniques, to shed a new light on the solutions for local e-government information portal. After taking the comparison between traditional approaches and sem...The paper introduces a new approach, that is, semantic Web techniques, to shed a new light on the solutions for local e-government information portal. After taking the comparison between traditional approaches and semantic approaches, the design of arehitecture and components of a local e-government information portal are illustrated in details based on semantic technologies. The paper also researches on the core technologies of implementation of the new approach, including the definition of e-government information portal Ontologies and searching algorithms.展开更多
E-Government is defined as a system utilizing the Internet and the world-wide-web for delivering government informa-tion and services to citizens. This system reduces the processing costs, improves service delivery, a...E-Government is defined as a system utilizing the Internet and the world-wide-web for delivering government informa-tion and services to citizens. This system reduces the processing costs, improves service delivery, and increases trans-parency and communication between a government and its citizens. The aim of this paper is to propose a new model to measure the readiness of e-Government according to cultural factors. By assessing to which degree these cultural factors are present/absent in a country and which of them have a significant impact on government readiness, the government will be able to identify their weakness and strength points, then build a preparing plan that can help them to achieve the readiness required toward a successful implementation of the e-Government systems.展开更多
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions...This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.展开更多
文摘Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. This paper identifies quality attributes that are required to assess the quality of an e-government website, which should be considered by developers during the development of e-government applications. The primary goals are identifying, qualifying, categorizing, and ranking these factors, and then defining the interrelations among these quality factors.
基金supported by the National Social Science Fund of China(23BGL272)。
文摘The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.
文摘The embracing of ICTs and related technologies has enhanced different approaches for governments worldwide to deliver services to their citizens in a smart way. However, the usage of e-government services by common citizens is recognized as one of the major setbacks of e-government development in both developed and developing countries. Moreover, government agencies in these countries are facing great challenges in keeping the citizens motivated enough to continue to use e-government services. This research aims to investigate the factors that influence citizens’ trust towards continue use of e-government services in Cameroon. The proposed research model consisted of three main constructs including technological, governmental, risk factors as well as six demographic characteristics (age, gender, educational level, income, internet experience and cultural perception). A five-point Likert scale questionnaire was designed to collect data physically and electronically, 352 valid questionnaires were retrieved. Simple and Multiple regression analysis methods were applied to build an adequate model based on the verification of hypotheses proposed. Based on results obtained, four demographic characteristics (age, education, occupation and income) have influence on citizens’ trust in e-government meanwhile gender and cultural affiliation have no influence. Furthermore, technological factors and governmental factors positively influence trust level in e-government, whereas risk factors have a negative influence on trust level. Deducing from the results, a list of recommendations is proposed to the government of Cameroon in order to reinforce citizens’ trust in e-government services.
基金the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
文摘Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.
基金This research funded by Al-Zaytoonah University of Jordan.
文摘In recent years,the telecommunications sector is no longer limited to traditional communications,but has become the backbone for the use of data,content and digital applications by individuals,governments and companies to ensure the continuation of economic and social activity in light of social distancing and total closure inmost countries in the world.Therefore,electronic government(e-Government)andmobile government(m-Government)are the results of technological evolution and innovation.Hence,it is important to investigate the factors that influence the intention to use m-Government services among Jordan’s society.This paper proposed a new m-Government acceptance model in Jordan(AMGS);this model combines the Information System(IS)Success Factor Model and Hofstede Cultural Dimensions Theory.The study was conducted by surveying different groups of the Jordanian community.Astructured questionnaire was used to collect data from203 respondents.Multiple regression analysis has been conducted to analyze the data.The results indicate that the significant predictors of citizen intention to use m-Government services in Jordan are Information Quality,Service Quality,Uncertainty Avoidance,and Indulgence vs.restraint.While,the results also suggest that Power Distance is not a significant predictor of citizen intention to use m-Government services.
基金This research has been funded by the Scientific Research Deanship at University of Ha'il-Saudi Arabia through Project Number RG-20023.
文摘Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.
文摘For exchanging and sharing information and services in e-government, a framework of information service platform (ISP) is presented. The multi-layer architecture of the ISP is introduced. They are. user's requirement layer, business service layer, business process layer, business function layer and data layer. The lower layers are based on the architecture of web services and the upper layers are related to the institutional and organizational issues. In order to deal with the variation of user's requirements and changing environment, the matching and mapping processes with adaptive mechanism are illustrated.
文摘Over the past years, many businesses, government and individuals have been started to adopt the internet and web-based technologies in their works to take benefits of costs reduction and better utilization of existing resources. The cloud computing is a new way of computing which aims to provide better communication style and storage resources in a safe environment via the internet platform. The E-governments around the world are facing the continued budget challenges and increasing in the size of their computational data so that they need to find ways to deliver their services to citizens as economically as possible without compromising the achievement of desired outcomes. Considering E-government is one of the sectors that is trying to provide services via the internet so the cloud computing can be a suitable model for implementing E-government architecture to improve E-government efficiency and user satisfaction. In this paper, the adoption of cloud computing strategy in implementing E-government services has been studied by focusing on the relationship between E-government and cloud computing by listing the benefits of creation E-government based on cloud computing. Finally in this paper, the challenges faced the implementation of cloud computing for E-government are discussed in details. As a result from understanding the importance of cloud computing as new, green and cheap technology is contributed to fixing and minimizing the existing problems and challenges in E-government so that the developed and developing countries need to achieve E-government based on cloud computing.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
基金supported by the National Social Science Foundation of China(No.:09&ZD039)
文摘Purpose:Today,the use of e-government services is still at a low level in China.Based on the understanding that citizen trust is an important factor influencing e-government adoption,this research tries to develop a model of citizen trust in e-government in an effort to study the impacts of trust-related factors on citizen intentions to adopt e-government services.Design/methodology/approach:The data was collected from an online survey of 182Chinese users who had more than 3 years' online experiences of using government websites.Structural equation modeling analysis was used to validate the proposed model.Findings:Our survey shows that trust in e-government,perceived usefulness and perceived ease of use are critical factors that influence citizen intentions to use e-government services.The study findings also indicate that citizen trust in e-government is positively associated with trust in government,institution-based trust and perceived usefulness of e-government services.Research limitations:The survey sampled adults aged from 25 to 35 years old.Such a limited sample group cannot represent all of the population.So a larger sample involving more experienced online users will yield more useful results.Practical implications:The study results will help government agencies,especially the Chinese government agencies,find ways to improve the Chinese citizens' trust in e-government and promote their adoptions of e-government services.Originality/value:Previous researches have investigated separately the impacts of user evaluation of government websites and user trust in e-government on user intentions to engage in e-government.This study makes a theoretical contribution by integrating these two perspectives and building a model of citizen trust in e-government in understanding the impacts of trust-related factors on citizens' adoptions of e-government initiatives.
基金supported by MOST under Grant No.MOST 103-2410-H-004-112
文摘We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornographic webpages with the following major advantages: 1) a weighted window-based technique was proposed to estimate for the condition of concept drift for the keywords found recently in pornographic webpages; 2) checking only contexts of webpages without scanning pictures; 3) an incremental learning mechanism was designed to incrementally update the pornographic keyword database.
文摘Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Methods: The documental quality of the 389 websites was estimated based upon the following parameters: 1) a combination of quality criteria from the Health Information Locator (LIS—OPS/BIREME) and those from Chile’s Pontifical Catholic University, organized into 17 variables;2) uniformity of reference criteria (Vancouver);3) association between the presence of authorship and a higher number of the quality criteria being fulfilled. We also studied the ranking of the results presented by Google in addition to attributes connected to the websites’ target audience, the types of content, their sponsors and country of origin. Results: Of the 389 websites studied, 111 links were not active (28.53% CI 95% [24.05 - 33.02]) and none of the websites in the sample met all of the 17 quality variables. Authored websites displayed remarkable differences in quality when compared to those which did not identify their authors. Conclusions: Faced with the issue of the proliferation of websites with questionable quality content, and the fact that the ranking of results interferes directly in the internal evaluation of content relevance, we propose that public-health research institutions cooperate with web-searching developers to improve the website-positioning formula, in which the “identified authorship” criterion should play a major role in the ranking system.
基金Supported by the National Natural Science Foun-dation of China (40501059) the National Basic Research Programof China(973 Program2006CB701305)
文摘The paper introduces a new approach, that is, semantic Web techniques, to shed a new light on the solutions for local e-government information portal. After taking the comparison between traditional approaches and semantic approaches, the design of arehitecture and components of a local e-government information portal are illustrated in details based on semantic technologies. The paper also researches on the core technologies of implementation of the new approach, including the definition of e-government information portal Ontologies and searching algorithms.
文摘E-Government is defined as a system utilizing the Internet and the world-wide-web for delivering government informa-tion and services to citizens. This system reduces the processing costs, improves service delivery, and increases trans-parency and communication between a government and its citizens. The aim of this paper is to propose a new model to measure the readiness of e-Government according to cultural factors. By assessing to which degree these cultural factors are present/absent in a country and which of them have a significant impact on government readiness, the government will be able to identify their weakness and strength points, then build a preparing plan that can help them to achieve the readiness required toward a successful implementation of the e-Government systems.
文摘This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.