Course: e-Government

» List of faculties » REK » FES
Course title e-Government
Course code FES/DEGO
Organizational form of instruction Lecture
Level of course Doctoral
Year of study not specified
Semester Winter and summer
Number of ECTS credits 8
Language of instruction Czech
Status of course unspecified
Form of instruction Face-to-face
Work placements This is not an internship
Recommended optional programme components None
Lecturer(s)
  • Čapek Jan, prof. Ing. CSc.
Course content
E-Government system within CR. The safety documents exchange. The way of distance acceses. The problems of the distance follows of the application processing. Electornic signature and certication authority will be taken into account.

Learning activities and teaching methods
Dialogic (discussion, interview, brainstorming)
Learning outcomes
The aim of this course is learn theoretical knowledge about e-Government The safety documents exchange, the way of distance acceses, the problems of the distance follows of the application processing, electornic signature and certication authority will be taken into account.
The student will be able to apply e-Government methods form both points of view, one who offered services and other who receive services.
Prerequisites
unspecified

Assessment methods and criteria
Oral examination

The student is lead to self-reliant work, when knowledge obtaining by his/her study is able to implant into his/her thesis. The problems solving by methods included within this subject are presented by student's self-reliant work. The student is able to defend his/her conclusions in the scientific discussion and implement it into his/her thesis.
Recommended literature
  • Bacard, A. Computer Privacy Handbook. 1995.
  • BISHOP. M. Introduction to Computer Security.. Addison Wesely, 2005.
  • Bishop, Matt. Introduction to computer security. Boston: Addison-Wesley, 2005. ISBN 0-321-24744-2.
  • Hunter,J., H., D. Information Security Handbook. Spriongler Verlag, 2001. ISBN 1-85233-180-1.
  • Leixner,M. PC zálohování a archivace dat. Grada, 1993.
  • Menezes A. J., Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. http://www.math.uwaterloo.ca/hac. CRC Press, 2001.
  • Schneier, B. Applied Cryptography, Protocols, Algorithms and source code in C.. John Wiley, 1996. ISBN 0-471-11709-9.
  • Stallings, William. Cryptography and network security : principles and practice. Upper Saddle River: Pearson Education, 2003. ISBN 0-13-111502-2.
  • Zelenka J., Čapek J., Francek J., Janáková H. Ochrana dat. Kryptologie.. Gaudeamus, Hradec Králové, 2003.


Study plans that include the course
Faculty Study plan (Version) Category of Branch/Specialization Recommended year of study Recommended semester
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Public Economics (2013) Category: Economy - Recommended year of study:-, Recommended semester: -
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Public Economics (2016) Category: Economy - Recommended year of study:-, Recommended semester: -
Faculty: Faculty of Economics and Administration Study plan (Version): Regional and Public Economics (2013) Category: Economy - Recommended year of study:-, Recommended semester: -