The 26th NISPAcee Annual Conference

Conference photos available

Conference photos available

In the conference participated 317 participants

Conference programme published

Almost 250 conference participants from 36 countries participated

Conference Report

The 28th NISPAcee Annual Conference cancelled

The 29th NISPAcee Annual Conference, Ljubljana, Slovenia, October 21 - October 23, 2021

The 2020 NISPAcee On-line Conference

The 30th NISPAcee Annual Conference, Bucharest, Romania, June 2 - June 4, 2022

An opportunity to learn from other researchers and other countries' experiences on certain topics.

G.A.C., Hungary, 25th Conference 2017, Kazan

Very well organised, excellent programme and fruitful discussions.

M.M.S., Slovakia, 25th Conference 2017, Kazan

The NISPAcee conference remains a very interesting conference.

M.D.V., Netherlands, 25th Conference 2017, Kazan

Thank you for the opportunity to be there, and for the work of the organisers.

D.Z., Hungary, 24th Conference 2016, Zagreb

Well organized, as always. Excellent conference topic and paper selection.

M.S., Serbia, 23rd Conference 2015, Georgia

Perfect conference. Well organised. Very informative.

M.deV., Netherlands, 22nd Conference 2014, Hungary

Excellent conference. Congratulations!

S. C., United States, 20th Conference 2012, Republic of Macedonia

Thanks for organising the pre-conference activity. I benefited significantly!

R. U., Uzbekistan, 19th Conference, Varna 2011

Each information I got, was received perfectly in time!

L. S., Latvia, 21st Conference 2013, Serbia

The Conference was very academically fruitful!

M. K., Republic of Macedonia, 20th Conference 2012, Republic of Macedonia

 :: Anonymous user Login / Register 

Optimised for Tablet | Smartphone

 Paper/Speech Details of Conference Program  

for the  16th NISPAcee Annual Conference
  Program Overview
II. Working Group on E-government
Author(s)  Franziska Cecon 
  Upper Austria University of Applied Sciences
Linz  Austria
Wolfgang Eixelsberger 
 
 Title  Trusted computing for public administration
File   Paper files are available only for conference participants, please login first. 
Presenter 
Abstract  
  
Trusted Computing is the upcoming technology helping to improve IT security. A study conducted shows the awareness of IT security. Furthermore, there is a model process shown using Trusting Computing. The third step has to do with the possible migration scenario to change to a trusted environment in the public administration.

Methods and Results:

The research project is conducted in three different stages.
(1) Analysis of the current state of Trusted Computing in the public administration (local, provin-cial and federal level) through in-depth interviews with key users.
(2) Identification of potential processes for Trusted Computing within the public administration through process analysis.
(3) Development of migration scenarios to change towards processes supported by Trusted Com-puting.

(1) Trusted Computing is in principle unknown in the field of public administration. There are two main reasons for that: (1) the concept is still in the state of intensive research and (2) there has not been a roll-out of this concept in other fields. The need for more and higher measures of security in the field of IT is a given fact which was approved throughout this research project conducted. A seminar held by the European Commission in springtime 2006 on the topic "Trust in the net" led to the highly prioritised conclusion that Trusted Computing infrastructures need to be introduced, in order to ensure secure transactions and accomplish data protection laws.

(2) Public administration processes are identified which might be most appropriate for the use of Trusted Computing. To ensure the best choice, a selected number of key experts of public admini-stration has been interviewed. Potential processes and applications are for example public health, e-voting or the use of mobile electronic devices for employed field staff that gets access to internal public information and databases.

(3) The introduction of Trusted Computing technology requires a change in hardware, software as well as organisational processes. Besides a necessary certification infrastructure there is a consistent standard needed. A thorough planning as well as the technical, organisational and personnel re-quirements are crucial for a successful migration process. The potential migration scenario is shown by the selected process (2).


Discussion and Conclusions:

Currently the research project is dealing with state (2) and moving on to state (3). The conducted interviews promoted the idea of IT-security and increased the awareness for potential solutions of future IT problems. The model process as well as the migration scenario will be approved by IT specialists in the public administration. The model process will be centrally in the paper delivered to NISPAcee Annual Conference.