Spatial data exchange for E-government

被引:0
|
作者
Institute of Geo-Spatial Information, Tsinghua University, Beijing 100084, China [1 ]
不详 [2 ]
机构
来源
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Data exchange of E-Government
    Luo, YL
    Tang, YY
    Luo, YD
    Fourth Wuhan International Conference on E-Business: The Internet Era & The Global Enterprise, Vols 1 and 2, 2005, : 1339 - 1344
  • [2] Analysis on the Application of Data Exchange Platform in E-government
    Luo, A-ling
    Liu, Shi-ping
    2016 2ND INTERNATIONAL CONFERENCE ON SOCIAL, EDUCATION AND MANAGEMENT ENGINEERING (SEME 2016), 2016, : 30 - 33
  • [3] Building e-government services over spatial data infrastructures
    Nogueras-Iso, J
    Latre-Abadía, MA
    Muro-Medrano, PR
    Zarazaga-Soria, FJ
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2004, 3183 : 387 - 391
  • [4] CONTEMPORARY METHODS OF SPATIAL DATA ACQUISITION - THE ROAD TO "E-GOVERNMENT"
    Kuburic, Miroslav
    Kopic, Milos
    Matic, Bojan
    GEODETSKI VESTNIK, 2014, 58 (02) : 314 - 326
  • [5] Spatial Data Infrastructure and e-government: A case study of the UK
    Pollard, P
    ELECTRONIC GOVENMENT, PROCEEDINGS, 2003, 2739 : 355 - 358
  • [6] E-government Quality of Data
    Balan, Claudia Mihaela
    2014 FIRST INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2014, : 91 - 95
  • [7] How is e-Government Progressing? A Data Driven Approach to E-government Monitoring
    Stragier, Jeroen
    Verdegem, Pieter
    Verleye, Gino
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (08) : 1075 - 1088
  • [8] A Measurement Maturity Model in the Use of Spatial Data Applied to e-Government
    Salas, Luis
    Tupia, Manuel
    Bruzza, Mariuxi
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [9] Connection between e-government and spatial research
    Zsom Brigitta
    TER ES TARSADALOM, 2014, 28 (03): : 18 - 31
  • [10] DATA PROTECTION IN E-GOVERNMENT SERVICES
    Aced-Felez, Emilio
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2011, 3 (03): : 35 - 44