Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Governance

2017 Vol. 9 No. 3/4

Special Issue on: Citizen Rights in the World of the New Computing Paradigms

Guest Editors: Prof. Sokratis Katsikas and Dr. Vasilios Zorkadis


EditorialIntroductionConference CalendarNews in Brief
PagesTitle and authors
185-209Democracy in the digital age: digital agora or dystopia
Peter Parycek; Bettina Rinnerbauer; Judith Schossböck
DOI: 10.1504/IJEG.2017.10008576

210-228Investigating the mobile side of e-participation
Maria Ntalian; Constantina Costopoulou; Sotiris Karetsos
DOI: 10.1504/IJEG.2017.10006250

229-245E-voting vs. e-trust: a test bed for e-democracy in a world in crisis?
Fouad Shat; Elias Pimenidis
DOI: 10.1504/IJEG.2017.10006254

246-266Smart cross-border e-Gov systems: an application to refugee mobility
Alexander B. Sideridis; Loucas Protopappas; Stergios Tsiafoulis; Elias Pimenidis
DOI: 10.1504/IJEG.2017.10006256

267-282TRILLION project approach on scenarios definition for citizen security services
Charalampos Z. Patrikakis; Aristidis Konstantas; Dimitris Kogias; Michał Choraś
DOI: 10.1504/IJEG.2017.10006257

283-299Advanced process simulation tool for improving the quality of decision-making in local government of the Czech Republic
Martin Molhanec; Vojtěch Merunka
DOI: 10.1504/IJEG.2017.10006258

300-342An evaluation scheme for local e-government and local e-democracy: the case of Greek municipalities
Georgios Lappas; Amalia Triantafillidou; Prodromos Yannas; Alexandros Kleftodimos
DOI: 10.1504/IJEG.2017.10008575

343-360Privacy protection of tagged multimedia content in online social networks
Alexandra Michota; Sokratis Katsikas
DOI: 10.1504/IJEG.2017.10007078

361-384Sharing secrets, revealing thoughts and feelings: perceptions about disclosure practices and anonymity in a FB university students' community
Maria Sideri; Angeliki Kitsiou; Christos Kalloniatis; Stefanos Gritzalis
DOI: 10.1504/IJEG.2017.10006251

385-403Security policy rules and required procedures for two crucial cloud computing threats
Dimitra Georgiou; Costas Lambrinoudakis
DOI: 10.1504/IJEG.2017.10006253