Javascript must be enabled to continue!
The Information Polity: Electronic Democracy, Privacy, and Surveillance
View through CrossRef
Abstract
The effectiveness of democratic institutions and processes could be greatly enhanced through developments in what has been called ‘teledemocracy’ —the use of ICTs to improve communication and the delivery of services to individuals and groups from governmental and political organizations.2 A variety of trials and experiments have sought to realize this vision since the 1960s (Sackman and Nie 1970; Sackman and Boehm 1972). However, it has only been since ICT-based Electronic Service Delivery (ESD) applications began to grow significantly in the 1990s that this vision has come closer to widespread realization (see Chapter 15).
Oxford University PressOxford
Title: The Information Polity: Electronic Democracy, Privacy, and Surveillance
Description:
Abstract
The effectiveness of democratic institutions and processes could be greatly enhanced through developments in what has been called ‘teledemocracy’ —the use of ICTs to improve communication and the delivery of services to individuals and groups from governmental and political organizations.
2 A variety of trials and experiments have sought to realize this vision since the 1960s (Sackman and Nie 1970; Sackman and Boehm 1972).
However, it has only been since ICT-based Electronic Service Delivery (ESD) applications began to grow significantly in the 1990s that this vision has come closer to widespread realization (see Chapter 15).
Related Results
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
End-to-End Reservoir Surveillance Optimization Through Automated Value of Information Assessments
End-to-End Reservoir Surveillance Optimization Through Automated Value of Information Assessments
Abstract
Effective reservoir management requires continuous surveillance to monitor the reservoir's performance and optimize production. To facilitate this, we propo...
Privacy in online advertising platforms
Privacy in online advertising platforms
Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of deliver...
Privacy awareness in generative AI: the case of ChatGPT
Privacy awareness in generative AI: the case of ChatGPT
Purpose
Generative AI, like ChatGPT, uses large language models that process human language and learn from patterns identified in large data sets. Despite the great benefits offere...
The Rig-Vedic and Post-Rig-Vedic Polity (1500 BCE-500 BCE) [PDF, E-Book]
The Rig-Vedic and Post-Rig-Vedic Polity (1500 BCE-500 BCE) [PDF, E-Book]
The book critically examines and assesses the literary evidence available through Vedic and allied literature portraying the nature of Vedic polity, the functionalities of its vari...

