Proposing a Knowledge Amphora Model for Transition towards Mobile Government

نویسندگان

  • Tunç D. Medeni
  • Tolga Medeni
  • Asim Balci
چکیده

As an important project for Turkey to achieve Information/Knowledge Society Strategic Goals, the e-Government Gateway currently focuses on the delivery of public services via a single portal on the Internet. In later stages, other channels such as mobile devices will be available for use, underlying a transition towards mobile and ubiquitous government services. In order to provide a supportive base for this transition, the authors develop a modeling of knowledge amphora (@), and link this conceptual model with the e-government gateway. Based on Knowledge Science concepts such as ubiquity, ba (physical, virtual, mental place for relationship-building and knowledge-creation), ma (time-space in-betweenness), reflection and refraction, the modeling of Knowledge Amphora incorporates the interactions @ the Internet and mobile devices that contribute to cross-cultural information transfer and knowledge creation. The paper presents recent electronic and mobile government developments of E-Government Gateway Project in Turkey as an application example of this philosophical and theoretical modeling. The contributed Ubiquitous Participation Platform for Policy Making (UbiPOL) project aims to develop a ubiquitous platform allowing citizens to be involved in policy making processes (PMPs). The resulting work is a practical case study as that develops new m-government operations. DOI: 10.4018/978-1-4666-2654-6.ch010

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing a Model for Patient Admission and NFC Mobile Payment by Biometric Identification and Smart Health Card

Abstract Following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. The current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. Traditionally, patie...

متن کامل

An Approach towards Promoting Iranian Caregivers’ Knowledge on Early Childhood Development

Background: According to the World Health Organization (WHO), parents need to be informed about Early Childhood Development (ECD). Different methods of parents’ education include group-based, face-to-face, book, booklet, web-based, technology-based, and mobile learning using laptops, tablets, and cell phones. Paying attention to caregivers' attitudes is the first step to their education. The ob...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJESMA

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2011