Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Innovating Government (eBook)

Normative, Policy and Technological Dimensions of Modern Government
eBook Download: PDF
2011 | 1st Edition.
XVIII, 466 Seiten
T.M.C. Asser Press (Verlag)
978-90-6704-731-9 (ISBN)

Lese- und Medienproben

Innovating Government -
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological dimensions. By joining authors from a diversity of backgrounds (law, ethics, public administration, political science, sociology, communications science, information science, and computer science) in one book, readers (academics, policy makers, legislators and others) are confronted with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management, that are central to today's evolution of new modes of modern government.
Governments radically change under the influence of technology. As a result, our lives in interaction with public sector bodies are easier. But the creation of an electronic government also makes us more vulnerable and dependent. Dependent not just on technology itself, but also on the organizations within government that apply technology, collect and use citizen-related information and often demand the citizens submit themselves to technological applications.  This book analyzes the legal, ethical, policy and technological dimensions of innovating government. Authors from diverse backgrounds confront the reader with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management. Clearly, the use of technology by governments demands that choices are made. In the search for guiding principles therein, an in-depth understanding of the developments related to electronic government is necessary. This book contributes to this understanding. This book is valuable to academics and practitioners in a wide variety of fields such as public administration and ICT, sociology, political science, communications science, ethics and philosophy. It is also a useful tool for policymakers at the national and international level. Simone van der Hof is Associate Professor at TILT (Tilburg Institute for Law, Technology, and Society), Tilburg University, The Netherlands. Marga Groothuis is Assistant Professor at the Faculty of Law of Leiden University in the Netherlands. Specific to this book:  Offers the reader a clear structureEnables the reader to see across disciplinary borders Offers an in-depth insight into new modes of government in various policy domains  This is Volume 20 in the Information Technology and Law (IT&Law) Series

Contents 6
About the Authors 9
1 Innovating Government: An Introduction to the Book 17
1.1…Background---the Tale of Reinventing and Innovating Government 18
1.2…Crossing Borders in Studying and Designing New Modes of Government 20
1.2.1 Crossing State Borders 20
1.2.2 Crossing Disciplinary Borders 21
1.2.3 Crossing Policy Borders 21
1.3…Structure of the Book---Various Dimensions 22
1.4…Normative and Ethical Dimensions---Part I 22
1.5…Policy Dimensions---Parts II and III 24
1.5.1 Democracy 24
1.5.2 Surveillance 25
1.6…Legal Dimensions---Parts IV, V and VI 26
1.6.1 EU Law Perspectives 26
1.6.2 Techno-legal Perspectives 28
1.6.3 Law and Philosophy Perspective 29
1.7…Technological Dimensions---Part VII 29
References 30
Part I Normative and Ethical Dimensions 31
2 Privacy 3.0 32
2.1…Introduction 32
2.2…The Public Debate 33
2.3…The Meaning of Privacy as a State of Affairs 34
2.4…The Meaning of Privacy as a Value 37
2.5…Normative Impact of Ambient Intelligence and Converging Technologies 38
2.6…Conclusion 40
References 41
3 Normative Assumptions in Biometrics: On Bodily Differences and Automated Classifications 44
3.1…Introduction 44
3.2…Human Differences and the Biometric Body 45
3.3…Sensitive Categories, ‘‘Partial Identities’’ and Soft Biometrics 48
3.4…A Transparent and Unobtrusive Future? 51
3.5…Conclusion: Critiquing Normativities in the Informatization of the Body 53
Acknowledgments 53
References 53
4 Electronic Exchange of Signals on Youth at Risk: A Value Perspective 56
4.1…Introduction 57
4.2…Value-Sensitive Design 59
4.3…Methodology: The Framework 61
4.4…Methodology Applied: Values and VIR---Case Description 63
4.4.1 Informal Institutions 63
4.4.2 Formal Institutions 65
4.4.3 Institutional Arrangements 66
4.4.4 Interactions by Actors 67
4.4.5 Technology 67
4.5…Methodology Applied: Values and VIR---Value-Sensitive Design 68
4.6…Conclusions and Reflections 69
References 70
5 Regulating Invisible Harms 72
5.1…Introduction 73
5.2…The Epistemic Gains of Identity Management 74
5.2.1 Power 75
5.2.2 Fecundity 75
5.2.3 Speed 76
5.2.4 Efficiency 76
5.2.5 Reliability 76
5.3…Accumulative Harm 77
5.4…Regulating Invisible Harms 84
5.5…Conclusion 86
References 86
Part II Policy Dimensions: Democracy 89
6 The Single Point of Failure 90
6.1…The Closed Model of Decision-Making 91
6.2…New Technologies and Civic Life 94
6.3…Participatory Democratic Theory in the Age of Networks 99
6.3.1 The Failure of Direct Democracy 100
6.3.2 The Timidity of Deliberative Democracy 101
6.3.3 Distinguishing Deliberative and Collaborative Democracy 103
6.3.4 The Argument for an Open and Collaborative Democracy 105
6.3.5 Challenges for Collaborative Democracy 107
References 110
7 Electronic Voting: Approaches, Strategies, and Policy Issues---A Report from Switzerland 113
7.1…Introduction 114
7.2…Overview 114
7.2.1 Approach 114
7.2.2 Pilot Projects 116
7.2.2.1 Geneva 116
7.2.2.2 Zurich 117
7.2.2.3 Neuchatel 118
7.2.3 Basel-Stadt 119
7.2.4 Conclusions 119
7.3…Policy Issues: Theory and Practice 120
7.3.1 Participation 120
7.3.1.1 Opportunities 120
7.3.1.2 Challenges 122
7.3.2 Autonomy 124
7.3.2.1 Opportunities 124
7.3.2.2 Challenges 125
7.3.3 Quality 126
7.3.3.1 Opportunities 126
7.3.3.2 Challenges 127
7.3.4 Conclusions 128
7.4…Institutional Framework for e-voting Systems 129
7.4.1 Design Challenge 129
7.4.2 Design Elements 130
7.4.2.1 Legal Factors 130
7.4.2.2 System Design 133
7.4.2.3 Social Norms 136
7.5…Conclusion 138
Acknowledgments 138
References 139
8 Striving Behind the Shadow: The Dawn of Spanish Politics 2.0 141
8.1…Introduction 142
8.2…A Definition of ‘Politics 2.0’ 143
8.3…The Spanish e-Readiness Level and Web 2.0 144
8.4…Spanish Online Politics 145
8.4.1 An Introduction to Online Politics 145
8.4.2 Spanish Parties and Online Politics 146
8.5…Political Blogging 149
8.6…Campaigning 150
8.7…Some Practical Examples to Pave Future Ways 152
8.7.1 The Power of Cyberactivism 153
8.7.2 The Acknowledgment and Naturalization of Cyberactivism 153
8.7.3 Blogging to Build and Weaved Blogging 154
8.7.4 Open Government, Open Parliaments 155
8.8…Conclusion 155
References 157
Part III Policy Dimensions: Surveillance 160
9 The Normality of Living in Surveillance Societies 161
9.1…Introduction 162
9.2…Global Surveillance and the Domestication of Security 163
9.3…Normalizing Surveillance Society 165
9.4…Everyday Life in Surveillance Societies 167
9.4.1 Aspect 1: Contrasting Perceptions of Surveillance 168
9.4.2 Aspect 2: Depth of Surveillance 169
9.4.3 Aspect 3: Exposure to Surveillance 169
9.4.4 The Emergence of Surveillance Societies 170
9.5…Concluding Discussion 171
References 172
10 The Evolution of New Technologies of Surveillance in Children’s Services in England 175
10.1…Introduction 176
10.2…Thinking about Surveillance 176
10.3…Case Study: ContactPoint 182
10.3.1 A Counter-Productive Move? 184
10.3.2 Opposition 184
10.3.3 Implementation 186
10.4…Conclusion 188
References 190
11 Electronic Child Records in The Netherlands: A Legitimate Path to Right Wrongs? 193
11.1…Introduction 193
11.2…Social Paradigms 194
11.3…From Simple Records to a Pervasive Monitoring System 195
11.4…The Potential Impact of ECRs 198
11.5…Legal Assessment I: A Human Rights-Based Approach 200
11.6…Legal Assessment II: General Principles of Administrative Law 202
11.7…Conclusions 205
References 205
12 Legitimacy Issues Regarding Citizen Surveillance: The Case of ANPR Technology in Dutch Policing 207
12.1…Introduction 208
12.1.1 Nodal Orientation as a New Police Strategy 208
12.1.2 Legitimacy Problems as a Reason and a Result 209
12.1.3 Chapter Outline 211
12.2…Legitimacy: Indicators, Relevance and Dilemmas for Nodal Policing 211
12.2.1 Assessing Legitimacy 211
12.2.1.1 Legality 212
12.2.1.2 Moral Justification 212
12.2.1.3 Social Acceptance 212
12.2.2 Relevance to Nodal Policing 213
12.2.3 Legitimacy Dilemmas 213
12.2.3.1 Variability 214
12.2.3.2 The Idea(l) of Legitimacy 214
12.2.3.3 Legitimacy Scale 215
12.2.3.4 Dilemmas: Contradictions Between Dimensions 215
12.3…Research Methods 216
12.3.1 Position of the Researcher 217
12.3.2 Informants 217
12.3.3 Observation 218
12.3.4 Interviews 218
12.3.5 Document Study 219
12.4…The Power of ANPR 219
12.4.1 Technological Power 219
12.4.2 The Nodalville ANPR System 220
12.4.3 ANPR Applications 221
12.4.3.1 Direct Pursuit 221
12.4.3.2 Further Investigation 221
12.5…Legitimacy Issues in ANPR Policy-Making 222
12.5.1 Legality 222
12.5.1.1 Consciousness of the Need for Legal Legitimation 222
12.5.1.2 Instrumental Legality 223
12.5.1.3 Legality as a Risk 223
12.5.2 Moral Justification 223
12.5.2.1 Effectiveness and Efficiency 223
12.5.2.2 Nodal Orientation 223
12.5.2.3 Frontrunner Position 224
12.5.3 Social Acceptance 224
12.5.3.1 Remaining Informed 224
12.5.3.2 Strategic Consideration 224
12.5.3.3 Cautious Communication 224
12.5.3.4 Influencing Social Acceptance 225
12.6…Final Remarks 225
References 225
13 The Introduction of Biometrics in The Netherlands: An Evaluation Under Data Protection and Administrative Law 227
13.1…Introduction 228
13.2…‘Classic’ and ‘Second Generation’ Biometrics 228
13.3…Biometric Applications in the Private and the Public Domain 229
13.4…Some Observations on Unintentional Side Effects of Dutch Government Policy on Biometrics 232
13.5…A Data Protection Approach 233
13.6…An Administrative Law Approach 235
13.7…Conclusion 237
References 238
Part IV Legal Dimensions:EU Law Perspectives 239
14 The Use of Biometrics at the Borders: A European Policy and Law Perspective 240
14.1…Introduction 241
14.2…Migration Control and the Use of Biometrics 242
14.2.1 Eurodac 242
14.2.2 SIS and SIS II 243
14.2.3 VIS 244
14.2.4 Biometrics in Identity Documents and Residence Permits 246
14.3…Extended Use of Biometrics for Law Enforcement Purposes 247
14.3.1 Eurodac 247
14.3.2 SIS II 248
14.3.3 VIS 249
14.4…Right to Privacy Right to Data Protection 250
14.4.1 Biometrics and Interference of the Right to Privacy 250
14.4.2 Necessary in a Democratic Society 251
14.4.3 In Accordance with the Law 252
14.4.4 Right to Data Protection: A Fundamental Right 253
14.5…‘Strike the Right Balance?’ 254
14.5.1 The Value of Impact Assessment 254
14.5.2 European Data Protection Supervisor and National Data Protection Authorities 256
14.5.3 European Parliament 256
14.6…Conclusion 257
References 258
15 Privacy and Data Protection Aspects of e-Government Identity Management 259
15.1…Introduction 260
15.2…Application of the Legal Data Protection Framework to e-Government 261
15.2.1 Legitimacy of Processing 261
15.2.2 Finality 262
15.2.3 Data Accuracy 264
15.2.4 Confidentiality and Security of Processing 265
15.2.5 Transparency of Processing and Related Data Subject Rights 269
15.2.6 Determination of Tasks, Responsibilities, and Roles 270
15.2.7 Use of Unique Identifiers 272
15.3…Current Practices 273
15.3.1 Internal Market Information System 274
15.3.1.1 Definition of Roles and Responsibilities 275
15.3.1.2 Legitimacy of Processing 276
15.3.1.3 Data Quality 277
15.3.1.4 Transparency and Accommodation of Data Subject Rights 278
15.3.1.5 ID Number Policy 280
15.3.2 The Increasing Use of Biometric Data 281
15.3.2.1 Large-Scale Biometric Applications: Some Examples 281
15.3.2.2 Legitimacy of the Processing 283
15.3.2.3 Re-purposing of Biometric Data 284
15.3.2.4 Data Quality 285
15.3.2.5 The Risks of Biometric Identifiers 286
15.3.2.6 Security Flaws 286
15.4…Conclusion 287
References 288
16 eHealth from a Dutch Perspective 291
16.1…Introduction 292
16.2…Developments Related to eHealth 293
16.2.1 Introduction 293
16.2.2 European Policy Developments 294
16.2.2.1 eHealth Action Plan 294
16.2.2.2 i2010 294
16.2.2.3 Lead Market Area 294
16.2.2.4 Patient Safety 296
16.2.2.5 Interoperability of Health Records and Health Services (Patient Safety) 296
16.2.2.6 Prague Declaration 297
16.2.2.7 eHealth on the Political Agenda of Sweden’s Presidency 297
16.2.3 eHealth Developments in the Netherlands 297
16.2.3.1 Examples of Dutch eHealth Applications 299
16.2.3.2 TCCN (‘Stichting Teledermatologisch Consultatie Centrum’) 299
16.2.3.3 Virtual Thrombosis Service 300
16.2.3.4 ZorgDomein 300
16.2.3.5 Portal Website for Invitro Fertilization Treatment 300
16.2.3.6 I.COM: Mental eHealth 301
16.2.3.7 National Electronic Health Record 301
16.3…The European Legal Framework for eHealth 302
16.3.1 Introduction 302
16.3.2 The European Legal Framework 303
16.3.2.1 Patient Data Protection, Privacy and Confidentiality 304
16.3.2.2 Product and Services Liability 305
16.3.2.3 General Contract Law and Consumer Protection 306
16.3.2.4 Product Safety 306
16.3.2.5 Liability for Damages by an eHealth Device 307
Products 307
Services 307
16.3.2.6 European Competition Law 308
16.3.2.7 What does European Competition Law Imply? 309
16.3.2.8 Patient’s Rights, Patient Safety and Quality of Care 310
Cross-Border Healthcare 310
Medical Devices 312
Professional Qualifications 313
16.4…A Dutch Analysis of the European Legal Issues 313
16.4.1 Introduction 313
16.4.2 Patient Data Protection, Privacy, and Confidentiality 314
16.4.3 Product, Services, and Professional Liabilities 316
16.4.4 Competition Law 317
16.4.5 Patient Safety and Quality of Care 318
16.5…Conclusion 319
References 320
17 Implementation of the EU Services Directive: On eGovernment in a Decentralized Unitary State 322
17.1…Introduction 323
17.2…Point of Single Contact---Legal and Organizational Framework 324
17.2.1 Basis of EU Law 324
17.2.2 Legal and Organizational Implementation in the Netherlands 324
17.3…Challenges from a Constitutional Point of View 326
17.4…Legal Assessment: Principles of Good Governance Applied in a Digital Context 328
17.5…Conclusion 332
References 333
18 The Impact of Europe on Geo-Information 335
18.1…Introduction 336
18.2…What is Geo-Information? 337
18.3…European Rules in the Context of Geo-Information 338
18.3.1 Directive 96/9/EC on the Legal Protection of Databases 338
18.3.2 Directive 2003/98/EC on the Reuse of Public Sector Information 339
18.3.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE) 340
18.4…The Directives Evaluated: Is there an Impact on Geo-Information? 341
18.4.1 Directive 96/9/EC on the Legal Protection of Databases 341
18.4.2 Directive 2003/98/EC on the Reuse of Public Sector Information 342
18.4.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE) 343
18.5…The Landmark Case: A Landmark Decision for Geo-Information 344
18.6…Other Initiatives to Improve Dissemination of Geo-Information in The Netherlands 346
18.7…Conclusion 347
References 349
Part V Legal Dimensions:Techno-legal Perspectives 350
19 Sharing Information between Government Agencies: Some Legal Challenges Associated with Semantic Interoperability 351
19.1…One Word, a Bundle of Definitions 352
19.2…Local, Regional, and Global Legal Concepts 353
19.3…‘Live-in Partner’ as an Example 355
19.4…The Problem of Bad Drafting 358
19.5…Fixing Problems Administratively 360
19.6…Court Decisions: Distinguishing the Case 361
19.7…The Problem of Political Control 362
19.8…Conclusion 363
References 365
20 Public Information Infrastructures and Identity Fraud 366
20.1…Introduction 367
20.2…Chains and Chain Cooperation 367
20.2.1 Chain Issues 367
20.2.2 Concepts of ‘Chain’, ‘Dominant Chain Problem’ and ‘Chain Level’ 368
20.2.3 Chain Thinking 369
20.2.4 The Scientific Relevance of the Chain Concept: Fallacy of the Wrong Level 369
20.2.5 Example: The European Union’s Biometric Visa System 370
20.2.6 Remedies Offered by the Doctrine of Chain Computerization 371
20.2.7 Chain Research Results in the Chain Dimension 372
20.3…Identity Fraud (Identity Theft) 373
20.3.1 The Concept of Identity Fraud (Identity Theft) 373
20.3.2 Identity Fraud, a Growing Problem 374
20.3.2.1 More Traces, Less Evidence 374
20.3.2.2 Identity Fraud Spreading Unnoticed 374
20.3.2.3 Balance of Power Shift in a Digitized Environment 375
20.3.2.4 ID-Checking Involves Blind Spots 375
20.3.3 Chain Research Results in the Identity Fraud Dimension 376
20.4…Identity Fraud in the Criminal Law Enforcement Chain 376
20.4.1 Identity Fraud in the Dutch Criminal Law Enforcement Chain 376
20.4.2 Identity Fraud in the Criminal Law Enforcement Chain at EU Level 379
20.5…Some Conclusions and Challenges 382
20.5.1 Conclusions 382
20.5.2 Challenges 382
References 383
21 Access to Law in Europe 385
21.1…Introduction 386
21.2…Access to Law in Europe 387
21.2.1 Access to Legal Information at the Dawn of the Internet Age 387
21.2.2 Access to Legal Information from 1999 388
21.2.3 A Case Study: The Netherlands 389
21.3…A Right of Access to Legal Information 391
21.3.1 Levels of Accessibility 391
21.3.2 Accessibility of EUR-Lex 392
21.3.3 Accessibility of Officielebekendmakingen.nl 393
21.3.4 Legal Framework for a Right of Access 394
21.4…Conclusion 399
Acknowledgments 399
References 399
Part VI Legal Dimensions:Law and Philosophy Perspective 401
22 Identity Theft and Fraud 402
22.1…Introduction 403
22.2…A Definition of Identity 404
22.2.1 Locke 404
22.2.1.1 Identity 404
22.2.1.2 Persons 405
22.2.1.3 Personal Identity 405
22.2.2 Internal Identity 406
22.2.3 External Identity 406
22.3…Identification 407
22.3.1 Identifiers 407
22.3.2 Control Over External Identity 408
22.4…Identity Fraud and Theft 409
22.4.1 Switched Identities 409
22.4.2 Motives 410
22.4.3 Means 411
22.4.4 Definitions 411
22.5…Illegality Under Dutch Law 411
22.5.1 Criminal Law---Fraud 412
22.5.2 Criminal Law---Theft 413
22.6…A Recent Case of Identity Theft 414
22.7…Conclusions 416
References 417
Part VIITechnological Dimensions 418
23 Biometrics and Smart Cards in Identity Management 419
23.1…Introduction 420
23.2…The Smart Card Landscape 420
23.2.1 Smart Cards and e-Government 421
23.3…Biometrics 422
23.3.1 Performance and Quality 423
23.3.2 Performance of Face and Fingerprint Recognition 424
23.4…Smart Card and RFID Technology 425
23.4.1 Smart Cards 425
23.4.1.1 The Terminal Problem 427
23.4.2 RFID 427
23.5…e-Passports 428
23.5.1 Accessing the Passport Chip 430
23.5.2 Drawbacks of the ICAO Standards 430
23.5.3 Tracking 431
23.5.4 Digitally Signed Passport Data 432
23.5.5 Function Creep 432
23.5.6 Lessons Learnt 433
23.6…Privacy Issues in Using Biometrics and Smart Cards 434
23.6.1 Privacy Implications of Biometrics 435
23.6.2 Use of Smart Cards 436
References 437
24 How Devices Transform Voting 439
24.1…Introduction 440
24.2…Voting Requirements 440
24.3…e-Voting in the Netherlands 441
24.4…Implicit Requirements 442
24.5…The Theory of Technological Mediation 444
24.6…Technology Mediates Voting 445
24.7…Challenges 446
24.7.1 Voting System 446
24.7.2 Autonomy 447
24.7.3 Secret Ballot/Privacy 448
24.7.4 Verifiability 449
24.7.5 Example: Estonia 450
24.8…Conclusions 451
Acknowledgments 451
References 451
Part VIIISynthesis 453
25 A Brave New Government? 454
25.1…Introduction 455
25.2…The Concept e-Government 455
25.3…Making e-Government Work 457
25.3.1 Getting Connected 457
25.3.2 Identity Construction 460
25.3.3 Efficient Big Brother 462
25.3.4 IT as a Tool for European Integration 463
25.4…Redefining Government 463
25.4.1 Changing the Face of Government: Seeing it in a Different Light 463
25.4.2 Accountability 464
25.5…Conclusion 465
Reference 465

Erscheint lt. Verlag 20.4.2011
Reihe/Serie Information Technology and Law Series
Information Technology and Law Series
Zusatzinfo XVIII, 466 p.
Verlagsort The Hague
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Allgemeines / Lexika
Recht / Steuern EU / Internationales Recht
Recht / Steuern Öffentliches Recht Verwaltungsverfahrensrecht
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Recht / Steuern Privatrecht / Bürgerliches Recht Medienrecht
Sozialwissenschaften Politik / Verwaltung Staat / Verwaltung
Schlagworte eDemocracy • eGovernment, politics and legislation • Identity Management • Information Technology • Social Implications
ISBN-10 90-6704-731-7 / 9067047317
ISBN-13 978-90-6704-731-9 / 9789067047319
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
CHF 24,60