Next Generation Society Technological and Legal Issues Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers
This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory fr...
Saved in:
Main Authors | , |
---|---|
Format | eBook Book Conference Proceeding |
Language | English |
Published |
Berlin, Heidelberg
Springer-Verlag
2010
Springer Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Edition | 1. Aufl. |
Series | Lecture notes of the Institute for Computer Sciences, Social-Informatics und Telecommunications Engineering |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing. |
---|---|
AbstractList | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services. Table of Contents: Session 1: Politics - Legislation - Regulatory. Framework I: Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, and Anastasios Sivridis: A Study on the Lack of Enforcement of Data Protection Acts (3-12); Christos Manolopoulos, Rozina Efstathiadou, and Paul Spirakis: The Impact of the Web and Political Balance to e-Democracy (13-28); Alexandros Xenakis, Euripides Loukis: Using Structured e-Forum to Support the Legislation Formation Process (29-40); Session 2: Enhancing Quality of Life through e-Services: Emmanouil Stiakakis, Pavlos Kariotellis, and Maria Vlachopoulou: From the Digital Divide to Digital Inequality: A Secondary Research in the European Union (43-54); Manos Tentzeris, Li Yang: Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The "Green" Ultimate Solution for an Ever Improving Life Quality and Safety? (55-63); Fathul Wahid: Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective (64-75); Session 3: Politics - Legislation - Regulatory. Framework II: Vassilis Meneklis, Christos Douligeris: Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems (79-86); Session 4: Supporting Democracy through e-Services: Sonali Batra: e-Campaigning: The Present and Future (89-98); Triantafillou Vasilis, Kalogeras Dimitris: e-Democracy: The Political Culture of Tomorrow's Citizens (99-107); Ronny Siebes: Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network (108-117); Federica Paganelli, Dino Giuli: Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting (118-127); Nicolas Desquinabo, Nils Ferrand, and Julie Marlier: Stakeholder e-Participation in Local Planning: The Camargue Park Case (128-137); Session 5: Identity Management, Privacy and Trust: Athanasios Karantjias, Nineta Polemi: Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems (141-150); A. Tasidou, P. S. Efraimidis, and V. Katos: Economics of Personal Data Management: Fair Personal Information Trades (151-160); Panayiotis Kotzanikolaou, Sotirios Maniatis, Eugenia Nikolouzou, and Vassilios Stathopoulos: Evaluating Common Privacy Vulnerabilities in Internet Service Providers (161-170); Georgios Stylios, Dimitrios Tsolis: Intellectual Property Rights Protection in Peer to Peer Networks (171-178); Session 6: Security, Attacks and Crime: Georgios Pangalos, Vasilios Katos: Information Assurance and Forensic Readiness (181-188); Stelios Dritsas, Dimitris Gritzalis: An Ontology-Driven antiSPIT Architecture (189-198); V. Liagkou, P. Spirakis, and Y. C. Stamatiou: Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? (199-208); Vasileios Vlachos, Diomidis Spinellis, and Stefanos Androutsellis-Theotokis: Biological Aspects of Computer Virology (209-219); Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, and Stefanos Gritzalis: Information Systems Security Management: A Review and a Classification of the ISO Standards (220-235); Dimitrios X. Gkoutzelis, Manolis S. Sardis: Web Server Security on Open Source Environments (236-247); Session 7: e-Government and Local e-Government: Noella Edelmann, Johann Hoechtl, and Peter Parycek: e-Government Readiness, Strategy and Two Different User Groups - in Austria (251-258); Miltiades E. Anagnostou, Maria A. Lambrou: On e-Government Project Development in Balmeda (259-269); Igor Metz, Adrian Blöchlinger, and Alexandros Varveris: A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States (270-278); Bwalya Kelvin Joseph: e-Government for Development Information Exchange (DIE): Zambia (279-292); Session 8: Education and Training: Markellos Konstantinos, Markellou Penelope, Koutsonikos Giannis, and Liopa-Tsakalidi Aglaia: Semantic e-Learning: Next Generation of e-Learning? (295-308); Pavlos Koulouris, Sofoklis Sotiriou: Supporting Rural Citizens' Access to Knowledge: One More Aspect of e-Democracy (309-319); Nikos Manouselis, Katerina Riviou, Nikos Palavitsinis, Vasiliki Giannikopoulou, and Panayotis Tsanakas: Evaluating a Greek National Action on Parents' Training on ICT and Internet Safety (320-328); Katerina Riviou, Katerina Papakonstantinou, and Panayotis Tsanakas: Evaluating a Greek National Action on Students' Training on ICT and Programming Competences (329-338); Session 9: Collaboration, Social Networking, Blogs: George Pentafronimos, Thanos Karantjias, and Nineta Polemi: OPSIS: An Open, Preventive and Scalable Migration Information System (341-350); Ioannis Panaretou, Nikos Karousos, Ioannis Kostopoulos, Georgia-Barbara Foteinou, and Giorgos Pavlidis: Online Communities: The Case of Immigrants in Greece (351-359); Leonidas Anthopoulos, Panos Fitsilis: From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities (360-372); Emmanouil Serrelis, Nikolaos Alexandris: A New Paradigm for Secure Social Lending (373-385); Antoinette Basson, Yoliswa Makhasi, and Daan van Vuuren: Techno Generation: Social Networking amongst Youth in South Africa (386-396); Nikolaos Polychronis, Charalampos Patrikakis, and Athanasios Voulodimos: Combining Immersive Virtual Worlds and Virtual Learning Environments into an Integrated System for Hosting and Supporting Virtual Conferences (397-407); Session 10: Pervasive, Ubiquitous, and Intelligent Computing: Alexis Papadimitriou, Dimitrios Katsaros, and Yannis Manolopoulos: Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks (411-420); Spyridon Papastergiou, Despina Polemi, and Christos Douligeris: SWEB: An Advanced Mobile Residence Certificate Service (421-430); Kyriacos A. Antoniades: p-Democracy a Pervasive Majority Rule (431-440); Albana Gaba, Spyros Voulgaris, and Maarten van Steen: Group Monitoring in Mobile Ad-Hoc Networks (441-451). Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services. The ability to work, communicate, interact, conduct business, and enjoy digital entertainment virtually anywhere is r- idly becoming commonplace due to a multitude of small devices, ranging from mobile phones and PDAs to RFID tags and wearable computers. The increasing number of connected devices and the proliferation of networks provide no indication of a sl- down in this tendency. On the negative side, misuse of this same technology entails serious risks in various aspects, such as privacy violations, advanced electronic crime, cyber terrorism, and even enlargement of the digital divide. In extreme cases it may even threaten basic principles and human rights. The aforementioned issues raise an important question: Is our society ready to adopt the technological advances in ubiq- tous networking, next-generation Internet, and pervasive computing? To what extent will it manage to evolve promptly and efficiently to a next-generation society, ado- ing the forthcoming ICT challenges? The Third International ICST Conference on e-Democracy held in Athens, Greece during September 23-25, 2009 focused on the above issues. Through a compreh- sive list of thematic areas under the title "Next-Generation Society: Technological and Legal issues," the 2009 conference provided comprehensive reports and stimulated discussions on the technological, ethical, legal, and political challenges ahead of us. This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing. |
Author | Sideridis, Alexander B Patrikakis, Charalampos Z |
Author_xml | – sequence: 1 fullname: Patrikakis, Charalampos Z – sequence: 2 fullname: Sideridis, Alexander B |
BackLink | http://www.fachportal-paedagogik.de/fis_bildung/suche/fis_set.html?FId=917298$$DAccess content in the German Education Portal |
BookMark | eNpVkE9TwjAQxaOiIyIfQE_15HioJNmmaY_KIDLD6EHG8ZZJwwKV2mBT__DtDdRhNJdk3_u9zeyekFZpSyTkjNFrRqnspTIJIYwjHjIWAwvFHul6DbyyFcQ-abMklmHC-cvBX4-nvLXzGDsi7TgGmsYJS45J17lX6g8IISS0SfyA33UwxBIrXee2DJ6sybFeBxM0i9IWdp4bXQS6nAZjnPvXyLkPdKfkcKYLh93fu0Oe7waT_n04fhyO-jfjUEcchAyNyaiImIy4yQSkUwEC_c9IGQD3smcyLliEGVIvZBJmOkNOGYNplJoMOuSqaazdEr_cwha1U58FZtYunfq3EM_2GtatqrycY6UailG1WemGVqA8r7YBtUlcNolVZd_9WLXaNjZY1pUu1OC2H0MqowQ8ed6Q03w1U77_m67WKmWSp4k3LxrT5H5Rdmc35WZIgB9CkIHs |
ContentType | eBook Book Conference Proceeding |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | 08O 9S6 |
DEWEY | 303.4833 |
DOI | 10.1007/978-3-642-11631-5 |
DatabaseName | ciando eBooks FIS Bildung Literaturdatenbank |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics Sociology & Social History Applied Sciences Computer Science Government Library & Information Science Social Sciences (General) |
EISBN | 9783642116315 3642116310 |
EISSN | 1867-822X |
Edition | 1. Aufl. 1 2010 edition. |
Editor | Sideridis, Alexander B. Patrikakis, Charalampos Z. |
Editor_xml | – sequence: 1 givenname: Alexander B. surname: Sideridis fullname: Sideridis, Alexander B. email: as@aua.gr organization: Informatics Laboratory, Agricultural University of Athens, Athens, Greece – sequence: 2 givenname: Charalampos Z. surname: Patrikakis fullname: Patrikakis, Charalampos Z. email: bpatr@aua.gr organization: Informatics Laboratory, Agricultural University of Athens, Athens, Greece |
ExternalDocumentID | 9783642116315 195027 EBC6397483 917298 ciando43573 |
GroupedDBID | -T. 089 08O 0D6 0DA 0E8 20A 38. 4UP 4V3 9-Z A4J AABBV AAFYB ABBVZ ABMKK ABMNI ACDPG ACWCF ACZTO ADVHH AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS BBABE BC- CZZ IEZ JJU MA. MYL NUC OV6 SAO SBO TBMHI TPJZQ 9S6 AEJLV I4C Z81 29L ACGFS RSU |
ID | FETCH-LOGICAL-a42357-ccb0541742cb539d535e555e01332174357b2514ebe0321b73fabe20113d49cb3 |
ISBN | 9783642116292 3642116299 |
ISSN | 1867-8211 |
IngestDate | Mon Apr 08 05:29:36 EDT 2024 Wed Oct 30 01:23:40 EDT 2024 Tue Mar 19 00:08:04 EDT 2024 Thu Jul 25 06:28:36 EDT 2024 Tue Dec 05 05:24:58 EST 2023 |
IsPeerReviewed | false |
IsScholarly | true |
Keywords | Computer Informatik |
LCCallNum_Ident | JF1315.2-2112 |
Language | English |
LinkModel | OpenURL |
MeetingName | International Conference on e-Democracy |
MergedId | FETCHMERGED-LOGICAL-a42357-ccb0541742cb539d535e555e01332174357b2514ebe0321b73fabe20113d49cb3 |
OCLC | 663096818 |
PQID | EBC6397483 |
PageCount | XIV, 454 |
ParticipantIDs | askewsholts_vlebooks_9783642116315 springer_books_10_1007_978_3_642_11631_5 proquest_ebookcentral_EBC6397483 dipf_primary_917298 ciando_primary_ciando43573 |
PublicationCentury | 2000 |
PublicationDate | 2010 2010-01-30 |
PublicationDateYYYYMMDD | 2010-01-01 2010-01-30 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin – name: Berlin, Heidelberg |
PublicationSeriesTitle | Lecture notes of the Institute for Computer Sciences, Social-Informatics und Telecommunications Engineering |
PublicationYear | 2010 |
Publisher | Springer-Verlag Springer Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer-Verlag – name: Springer – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
RelatedPersons | Dressler, Falko Shen, Xuemin (Sherman) Xiaohua, Jia Zomaya, Albert Ferrari, Domenico Kobayashi, Hisashi Cao, Jiannong Palazzo, Sergio Stan, Mircea Coulson, Geoffrey Gerla, Mario Akan, Ozgur Bellavista, Paolo Sahni, Sartaj |
RelatedPersons_xml | – sequence: 1 givenname: Ozgur surname: Akan fullname: Akan, Ozgur organization: Middle East, Technical University, Turkey – sequence: 2 givenname: Paolo surname: Bellavista fullname: Bellavista, Paolo organization: University of Bologna, Italy – sequence: 3 givenname: Jiannong surname: Cao fullname: Cao, Jiannong organization: Hong Kong Polytechnic University, Hong Kong – sequence: 4 givenname: Falko surname: Dressler fullname: Dressler, Falko organization: University of Erlangen, Germany – sequence: 5 givenname: Domenico surname: Ferrari fullname: Ferrari, Domenico organization: Università Cattolica Piacenza, Italy – sequence: 6 givenname: Mario surname: Gerla fullname: Gerla, Mario organization: UCLA, USA – sequence: 7 givenname: Hisashi surname: Kobayashi fullname: Kobayashi, Hisashi organization: Princeton University, USA – sequence: 8 givenname: Sergio surname: Palazzo fullname: Palazzo, Sergio organization: University of Catania, Italy – sequence: 9 givenname: Sartaj surname: Sahni fullname: Sahni, Sartaj organization: University of Florida, USA – sequence: 10 givenname: Xuemin (Sherman) surname: Shen fullname: Shen, Xuemin (Sherman) organization: University of Waterloo, Canada – sequence: 11 givenname: Mircea surname: Stan fullname: Stan, Mircea organization: University of Virginia, USA – sequence: 12 givenname: Jia surname: Xiaohua fullname: Xiaohua, Jia organization: City University of Hong Kong, Hong Kong – sequence: 13 givenname: Albert surname: Zomaya fullname: Zomaya, Albert organization: University of Sydney, Australia – sequence: 14 givenname: Geoffrey surname: Coulson fullname: Coulson, Geoffrey organization: Lancaster University, UK |
SSID | ssj0000355573 ssib023167542 ssj0000608566 |
Score | 2.2215378 |
Snippet | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40... Table of Contents: Session 1: Politics - Legislation - Regulatory. Framework I: Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, and Anastasios... This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics... Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information... |
SourceID | askewsholts springer proquest dipf ciando |
SourceType | Aggregation Database Publisher |
SubjectTerms | Computer Computer Appl. in Administrative Data Processing Computer Appl. in Social and Behavioral Sciences Computer Science Computers and Society Datenschutz Digitalisierung e-Commerce/e-business Economics Educational Technology Erkenntnistheorie Europäische Union Gesellschaft Gesetzgebung Informationsgesellschaft Informationssystem Internet Internet-Law and legislation-Congresses Lebensqualität Netzwerk Partizipation Politische Kultur Politische Willensbildung Politisches System Public Administration Regionalplanung Schule Soziale Ungleichheit Soziales Netzwerk Wahlkampf Wissensgesellschaft |
Subtitle | Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers |
TableOfContents | Information Systems Security Management: A Review and a Classification of the ISO Standards -- Introduction -- Information Security Management Systems Standards -- Concepts and Models for Information and Communications Technology (ICT) Security Management -- Information Security Management Systems -- Information Security Risk Management Standard -- Information Security Management Specific Areas' Standards -- Network Security Management -- Auditing -- Trusted Third Parties (TTPs) -- Incident Management -- Business Continuity -- Non-repudiation -- Digital Signatures -- Access Control -- Cryptographic Controls -- Systems Security Engineering -- Assurance and Evaluation -- Classification of Information Security Management Standards -- Limitations and Further Research -- References -- Web Server Security on Open Source Environments -- Introduction -- Facing Security Issues on the Front Line -- File Permissions -- Shielding Your Server with SSL -- Logging Critical Information -- Password Management and Backups -- VPN Usage for Extra Security -- Pioneering Security Mechanisms -- Building Your Own Honey Pots -- Password-Less Login Using RSA Keys -- Port-Knocking -- File System Encryption -- Conclusions and Future Work -- References -- Session 7 e-Government and Local e-Government -- e-Government Readiness, Strategy and Two Different User Groups - in Austria -- Introduction -- The Austrian e-Government Strategy -- e-Government Readiness -- Two Different e-Government User Groups in Austria -- User Group 1: The Municipalities -- User Group 2: Adolescent Citizens -- Lessons Learned -- References -- On e-Government Project Development in Balmeda -- Introduction -- The Environment -- The General Projects Office -- The Main Story -- Call for Tender Phase -- Requirements Collection -- Development -- Testing -- Analysis and Conclusions -- References A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States Sample and Data Collection -- Results and Discussion -- Concluding Remarks -- References -- Session 3 Politics - Legislation - Regulatory Framework II -- Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems -- Introduction -- Positivism and Interpretivism -- Analysis of e-Government Literature and Implications -- Conclusions -- References -- Session 4 Supporting Democracy through e-Services -- e-Campaigning: The Present and Future -- Introduction -- The McCain Campaign -- The Obama Campaign -- Obama on Facebook -- Generation Obama -- Obama Mobile -- Obama on Twitter -- Advertising in Video Games -- Public Involvement -- Vote Different -- Obama Girl -- The Future of e-Campaigning -- World Internet Usage Statistics -- Providing Web Accessibility for Everyone -- e-Voting -- Representative Interaction Websites -- Web 2.0 Technologies -- Web Feeds -- Wikis -- Mashups -- Folksonomies -- e-Campaigning and e-Democracy -- Conclusion -- References -- e-Democracy: The Political Culture of Tomorrow's Citizens -- Introduction -- Aim -- Method -- Data Collection -- Data Analysis -- Results -- The Effect of Internet on Students and the Factors That Influence It -- Students Opinions for e-Democracy -- The Opinions of Students Opposed to Those of Their Teachers -- Conclusions -- References -- Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network -- Introduction -- Electronic Voting -- Parademo as a Large-Scale Decision Making System for Communities -- Basic Concepts of Parademo -- Roles -- Groups -- Algorithms -- Algorithm to Calculate the Weight of Proposals -- Algorithm for Automated Reputation Feedback -- Listeners on Information Streams within Communities -- Summary and Future Work -- References Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting -- Introduction -- Related Work -- Model for eParticipation Application Design -- Telep@b Project -- Telep@b Portal -- Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project -- Conclusions -- References -- Stakeholder e-Participation in Local Planning: The Camargue Park Case -- Introduction -- Internet Potential for Participation in Local Planning -- Public Participation in Local Planning -- Internet Potential for Local Planning Participation -- Context and Tools of Camargue e-Consultation -- Institutional and Social Context of the Camargue e-Consultation -- e-Tools for Costless and More Deliberative Planning Debate -- Evaluation Design of the e-Consultation Features and Outcomes -- Hypotheses -- Evaluation Design -- First Results -- Conclusion -- References -- Session 5 Identity Management, Privacy and Trust -- Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems -- Introduction -- Existing Implementations and Related Work -- Federated Identity Management System -- Privacy-Aware Mobile Framework -- Usage Scenario of SecIdAM -- Conclusions -- References -- Economics of Personal Data Management: Fair Personal Information Trades -- Introduction -- Fair Personal Information Trades -- Concepts and Architecture -- Personal Data Management in FPIT -- FPIT-Users -- Payments in FPIT -- Trading Process in FPIT -- The FPIT Prototype -- Discussion -- References -- Evaluating Common Privacy Vulnerabilities in Internet Service Providers -- Introduction -- Privacy Related Critical Systems and Threats -- Privacy-Specific Threats -- Common Privacy Related Vulnerabilities and Possible Measures -- User Account Management -- Logging and Auditing Contractors and Third Parties -- Perimeter and Network Security -- System and Network Maintenance -- Conclusion -- References -- Intellectual Property Rights Protection in Peer to Peer Networks -- Introduction -- IPR Protection - Watermarking and Keys -- Copyright Protection through Watermarking -- Generating Keys with the Watermarking Algorithm -- Watermarking Keys and the P2P Network -- NBDT P2P Network -- Conclusions -- References -- Session 6 Security, Attacks and Crime -- Information Assurance and Forensic Readiness -- Introduction -- The Audit Process -- Forensic Readiness and the Digital Forensics Process -- Analysis and Discussion -- The Security Auditor Needs to Revisit the Risk Analysis Paradigm -- Redress -- Business Continuity and Forensic Readiness -- Well Established Roles in Forensics -- Forensics on the Security Policies -- Conclusions -- References -- An Ontology-Driven antiSPIT Architecture -- Introduction -- Spam over Internet Telephony (SPIT) -- A Proposed Anti-SPIT Architecture -- Anti-SPIT Policies -- The OntoSPIT Model -- SPIT Management Architecture -- Use of the Architecture -- Architecture Evaluation -- Conclusions and Further Research -- References -- Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? -- Introduction -- Random Graphs -- First and Second Order Logic and Relationships -- First Order Language of Graphs -- Second Order Language of Graphs -- Probability Theory - Undecidable Probabilities -- The Self-referential Nature of Trust -- Discussion -- References -- Biological Aspects of Computer Virology -- Introduction -- Related Work -- Infection Propagator -- Vulnerability Prevalence -- Age of the Vulnerability at Time of Exploitation -- Exploitation Difficulty -- Target Locator -- WormVirulence -- Computer Epidemiology -- Conclusion -- References Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Session 1 Politics - Legislation - Regulatory Framework I -- A Study on the Lack of Enforcement of Data Protection Acts -- Introduction -- Background -- Related Work -- Legal Background -- Study Setup -- Study Results -- The Privacy Policy -- Request for Consent -- Request for Information -- The Right of Deletion -- Conclusions -- References -- The Impact of the Web and Political Balance to e-Democracy -- Introduction -- Web, State and Political Movements -- Web and the Democratic Deficit Condition -- Web and Collective Action -- The Limits of Democracy -- Crisis or Reinforcement of Balance -- New Forms of Political Balance -- Conclusions -- References -- Using Structured e-Forum to Support the Legislation Formation Process -- Introduction -- Background -- Research Methodology -- The Austrian Parliament Pilot -- The Greek Parliament Pilot -- Conclusions -- References -- Session 2 Enhancing Quality of Life through e-Services -- From the Digital Divide to Digital Inequality: A Secondary Research in the European Union -- Introduction -- Determinant Factors of the Digital Divide -- Forms of Digital Inequality -- Methodological Approach -- Findings -- Conclusion -- References -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The"Green" Ultimate Solution for an Ever Improving Life Quality and Safety? -- Introduction -- Inkjet-Printed SW-CNT -- RFID-Enabled "Green" Wireless Sensor Node Module -- Conclusions -- References -- Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective -- Introduction -- Theoretical Framework -- e-Procurement -- Diffusion of Innovation -- The Perceived Characteristics of Innovating -- Research Design -- Research Setting -- Research Instrument |
Title | Next Generation Society Technological and Legal Issues |
URI | http://ebooks.ciando.com/book/index.cfm/bok_id/43573 http://www.fachportal-paedagogik.de/fis_bildung/suche/fis_set.html?FId=917298 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6397483 http://link.springer.com/10.1007/978-3-642-11631-5 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642116315 |
Volume | 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLZYeYC9AGWIlosshBASytTGdi4PPMBUNE2l4qFMe7PixJkQqJ2WDAl-PZ9vSTomBLxErdPajs_JudjnfIeQl7VKsmKm6ygtIQI5POYorxIWFbUBkyvmPLXlgD6ukuPP_ORMnPX1O212SasOy5835pX8D1XRBrqaLNl_oGzXKRrwGfTFFRTG9Zrxe6OeWUGwetxo9967CMzDfr-8gwJY6nMDqmFL7TlBYgCOm7dLf4Sw2rYOfdYFU4YAAhODGOo-BDFgCe-zen0yUwf1vDZVdYYpJ80Q8HC4w2AD1YY7DGGH8c0fALhsMgiHM5nE-WC70qDlRVnsxakettki6p0Mdlnzv4nzYQQHuo_QP5tHotddXUShqWYbp3tkL83jEbn9bnGyPA1yJTbZ_qHQr9XQMLKEN9ucxobhaY-1uwmbNKDwQLkDauofMJyOe4Dinbntk_2i-QoFBeXVNrBrzOZUtTUlIb5c1Dt-zLWjd2vRrO-Tgz7Xk37quOsBuaU3Y3LPOyc00BxNgQ9C25jcCVntuD3tMp_oK-q4gzoImh8PSWo4lfacSgOn0h1OpXgEajmVOk49IKcfFuuj48hX7IgKbnCTorJU8AHg5calEiyvBBMaa63haDDr_IpUwaLmEB0zNKiU1YXSxghlFc9LxR6R0Wa70Y8JLXhVz1TBk0JrrmDH85KpquJpLXSGtZ6QF4OFlt-_2eiCRvaUYnMxIVO3_vLCgbdI99VMBD2MDU26WzmM-TybEBpIJG2XPkpaLt4fmVNwnuGPrwPppBs0gH9jcMkkhpd2fCmmf__TJ-Ru__Y9JaP28ko_g8XbqueeoX8Bnk-drw |
link.rule.ids | 307,308,310,783,787,789,790,792,4056,4058,27938 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Next+Generation+Society.+Technological+and+Legal+Issues&rft.series=Lecture+Notes+of+the+Institute+for+Computer+Sciences%2C+Social+Informatics+and+Telecommunications+Engineering&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642116292&rft.issn=1867-8211&rft.eissn=1867-822X&rft.volume=26&rft_id=info:doi/10.1007%2F978-3-642-11631-5&rft.externalDocID=195027 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.askewsandholts.com%2Fuploads%2Fproduct%2Fimages%2Ffull%2F6315%2F9783642116315.jpg |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-11631-5 |