Next Generation Society Technological and Legal Issues Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers

This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory fr...

Full description

Saved in:
Bibliographic Details
Main Authors Patrikakis, Charalampos Z, Sideridis, Alexander B
Format eBook Book Conference Proceeding
LanguageEnglish
Published Berlin, Heidelberg Springer-Verlag 2010
Springer
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Edition1. Aufl.
SeriesLecture notes of the Institute for Computer Sciences, Social-Informatics und Telecommunications Engineering
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing.
AbstractList This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.
Table of Contents: Session 1: Politics - Legislation - Regulatory. Framework I: Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, and Anastasios Sivridis: A Study on the Lack of Enforcement of Data Protection Acts (3-12); Christos Manolopoulos, Rozina Efstathiadou, and Paul Spirakis: The Impact of the Web and Political Balance to e-Democracy (13-28); Alexandros Xenakis, Euripides Loukis: Using Structured e-Forum to Support the Legislation Formation Process (29-40); Session 2: Enhancing Quality of Life through e-Services: Emmanouil Stiakakis, Pavlos Kariotellis, and Maria Vlachopoulou: From the Digital Divide to Digital Inequality: A Secondary Research in the European Union (43-54); Manos Tentzeris, Li Yang: Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The "Green" Ultimate Solution for an Ever Improving Life Quality and Safety? (55-63); Fathul Wahid: Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective (64-75); Session 3: Politics - Legislation - Regulatory. Framework II: Vassilis Meneklis, Christos Douligeris: Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems (79-86); Session 4: Supporting Democracy through e-Services: Sonali Batra: e-Campaigning: The Present and Future (89-98); Triantafillou Vasilis, Kalogeras Dimitris: e-Democracy: The Political Culture of Tomorrow's Citizens (99-107); Ronny Siebes: Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network (108-117); Federica Paganelli, Dino Giuli: Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting (118-127); Nicolas Desquinabo, Nils Ferrand, and Julie Marlier: Stakeholder e-Participation in Local Planning: The Camargue Park Case (128-137); Session 5: Identity Management, Privacy and Trust: Athanasios Karantjias, Nineta Polemi: Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems (141-150); A. Tasidou, P. S. Efraimidis, and V. Katos: Economics of Personal Data Management: Fair Personal Information Trades (151-160); Panayiotis Kotzanikolaou, Sotirios Maniatis, Eugenia Nikolouzou, and Vassilios Stathopoulos: Evaluating Common Privacy Vulnerabilities in Internet Service Providers (161-170); Georgios Stylios, Dimitrios Tsolis: Intellectual Property Rights Protection in Peer to Peer Networks (171-178); Session 6: Security, Attacks and Crime: Georgios Pangalos, Vasilios Katos: Information Assurance and Forensic Readiness (181-188); Stelios Dritsas, Dimitris Gritzalis: An Ontology-Driven antiSPIT Architecture (189-198); V. Liagkou, P. Spirakis, and Y. C. Stamatiou: Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? (199-208); Vasileios Vlachos, Diomidis Spinellis, and Stefanos Androutsellis-Theotokis: Biological Aspects of Computer Virology (209-219); Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, and Stefanos Gritzalis: Information Systems Security Management: A Review and a Classification of the ISO Standards (220-235); Dimitrios X. Gkoutzelis, Manolis S. Sardis: Web Server Security on Open Source Environments (236-247); Session 7: e-Government and Local e-Government: Noella Edelmann, Johann Hoechtl, and Peter Parycek: e-Government Readiness, Strategy and Two Different User Groups - in Austria (251-258); Miltiades E. Anagnostou, Maria A. Lambrou: On e-Government Project Development in Balmeda (259-269); Igor Metz, Adrian Blöchlinger, and Alexandros Varveris: A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States (270-278); Bwalya Kelvin Joseph: e-Government for Development Information Exchange (DIE): Zambia (279-292); Session 8: Education and Training: Markellos Konstantinos, Markellou Penelope, Koutsonikos Giannis, and Liopa-Tsakalidi Aglaia: Semantic e-Learning: Next Generation of e-Learning? (295-308); Pavlos Koulouris, Sofoklis Sotiriou: Supporting Rural Citizens' Access to Knowledge: One More Aspect of e-Democracy (309-319); Nikos Manouselis, Katerina Riviou, Nikos Palavitsinis, Vasiliki Giannikopoulou, and Panayotis Tsanakas: Evaluating a Greek National Action on Parents' Training on ICT and Internet Safety (320-328); Katerina Riviou, Katerina Papakonstantinou, and Panayotis Tsanakas: Evaluating a Greek National Action on Students' Training on ICT and Programming Competences (329-338); Session 9: Collaboration, Social Networking, Blogs: George Pentafronimos, Thanos Karantjias, and Nineta Polemi: OPSIS: An Open, Preventive and Scalable Migration Information System (341-350); Ioannis Panaretou, Nikos Karousos, Ioannis Kostopoulos, Georgia-Barbara Foteinou, and Giorgos Pavlidis: Online Communities: The Case of Immigrants in Greece (351-359); Leonidas Anthopoulos, Panos Fitsilis: From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities (360-372); Emmanouil Serrelis, Nikolaos Alexandris: A New Paradigm for Secure Social Lending (373-385); Antoinette Basson, Yoliswa Makhasi, and Daan van Vuuren: Techno Generation: Social Networking amongst Youth in South Africa (386-396); Nikolaos Polychronis, Charalampos Patrikakis, and Athanasios Voulodimos: Combining Immersive Virtual Worlds and Virtual Learning Environments into an Integrated System for Hosting and Supporting Virtual Conferences (397-407); Session 10: Pervasive, Ubiquitous, and Intelligent Computing: Alexis Papadimitriou, Dimitrios Katsaros, and Yannis Manolopoulos: Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks (411-420); Spyridon Papastergiou, Despina Polemi, and Christos Douligeris: SWEB: An Advanced Mobile Residence Certificate Service (421-430); Kyriacos A. Antoniades: p-Democracy a Pervasive Majority Rule (431-440); Albana Gaba, Spyros Voulgaris, and Maarten van Steen: Group Monitoring in Mobile Ad-Hoc Networks (441-451).
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services. The ability to work, communicate, interact, conduct business, and enjoy digital entertainment virtually anywhere is r- idly becoming commonplace due to a multitude of small devices, ranging from mobile phones and PDAs to RFID tags and wearable computers. The increasing number of connected devices and the proliferation of networks provide no indication of a sl- down in this tendency. On the negative side, misuse of this same technology entails serious risks in various aspects, such as privacy violations, advanced electronic crime, cyber terrorism, and even enlargement of the digital divide. In extreme cases it may even threaten basic principles and human rights. The aforementioned issues raise an important question: Is our society ready to adopt the technological advances in ubiq- tous networking, next-generation Internet, and pervasive computing? To what extent will it manage to evolve promptly and efficiently to a next-generation society, ado- ing the forthcoming ICT challenges? The Third International ICST Conference on e-Democracy held in Athens, Greece during September 23-25, 2009 focused on the above issues. Through a compreh- sive list of thematic areas under the title "Next-Generation Society: Technological and Legal issues," the 2009 conference provided comprehensive reports and stimulated discussions on the technological, ethical, legal, and political challenges ahead of us.
This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing.
Author Sideridis, Alexander B
Patrikakis, Charalampos Z
Author_xml – sequence: 1
  fullname: Patrikakis, Charalampos Z
– sequence: 2
  fullname: Sideridis, Alexander B
BackLink http://www.fachportal-paedagogik.de/fis_bildung/suche/fis_set.html?FId=917298$$DAccess content in the German Education Portal
BookMark eNpVkE9TwjAQxaOiIyIfQE_15HioJNmmaY_KIDLD6EHG8ZZJwwKV2mBT__DtDdRhNJdk3_u9zeyekFZpSyTkjNFrRqnspTIJIYwjHjIWAwvFHul6DbyyFcQ-abMklmHC-cvBX4-nvLXzGDsi7TgGmsYJS45J17lX6g8IISS0SfyA33UwxBIrXee2DJ6sybFeBxM0i9IWdp4bXQS6nAZjnPvXyLkPdKfkcKYLh93fu0Oe7waT_n04fhyO-jfjUEcchAyNyaiImIy4yQSkUwEC_c9IGQD3smcyLliEGVIvZBJmOkNOGYNplJoMOuSqaazdEr_cwha1U58FZtYunfq3EM_2GtatqrycY6UailG1WemGVqA8r7YBtUlcNolVZd_9WLXaNjZY1pUu1OC2H0MqowQ8ed6Q03w1U77_m67WKmWSp4k3LxrT5H5Rdmc35WZIgB9CkIHs
ContentType eBook
Book
Conference Proceeding
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID 08O
9S6
DEWEY 303.4833
DOI 10.1007/978-3-642-11631-5
DatabaseName ciando eBooks
FIS Bildung Literaturdatenbank
DatabaseTitleList



DeliveryMethod fulltext_linktorsrc
Discipline Economics
Sociology & Social History
Applied Sciences
Computer Science
Government
Library & Information Science
Social Sciences (General)
EISBN 9783642116315
3642116310
EISSN 1867-822X
Edition 1. Aufl.
1
2010 edition.
Editor Sideridis, Alexander B.
Patrikakis, Charalampos Z.
Editor_xml – sequence: 1
  givenname: Alexander B.
  surname: Sideridis
  fullname: Sideridis, Alexander B.
  email: as@aua.gr
  organization: Informatics Laboratory, Agricultural University of Athens, Athens, Greece
– sequence: 2
  givenname: Charalampos Z.
  surname: Patrikakis
  fullname: Patrikakis, Charalampos Z.
  email: bpatr@aua.gr
  organization: Informatics Laboratory, Agricultural University of Athens, Athens, Greece
ExternalDocumentID 9783642116315
195027
EBC6397483
917298
ciando43573
GroupedDBID -T.
089
08O
0D6
0DA
0E8
20A
38.
4UP
4V3
9-Z
A4J
AABBV
AAFYB
ABBVZ
ABMKK
ABMNI
ACDPG
ACWCF
ACZTO
ADVHH
AEKFX
AEOKE
AETDV
AEZAY
AHSMR
ALMA_UNASSIGNED_HOLDINGS
BBABE
BC-
CZZ
IEZ
JJU
MA.
MYL
NUC
OV6
SAO
SBO
TBMHI
TPJZQ
9S6
AEJLV
I4C
Z81
29L
ACGFS
RSU
ID FETCH-LOGICAL-a42357-ccb0541742cb539d535e555e01332174357b2514ebe0321b73fabe20113d49cb3
ISBN 9783642116292
3642116299
ISSN 1867-8211
IngestDate Mon Apr 08 05:29:36 EDT 2024
Wed Oct 30 01:23:40 EDT 2024
Tue Mar 19 00:08:04 EDT 2024
Thu Jul 25 06:28:36 EDT 2024
Tue Dec 05 05:24:58 EST 2023
IsPeerReviewed false
IsScholarly true
Keywords Computer Informatik
LCCallNum_Ident JF1315.2-2112
Language English
LinkModel OpenURL
MeetingName International Conference on e-Democracy
MergedId FETCHMERGED-LOGICAL-a42357-ccb0541742cb539d535e555e01332174357b2514ebe0321b73fabe20113d49cb3
OCLC 663096818
PQID EBC6397483
PageCount XIV, 454
ParticipantIDs askewsholts_vlebooks_9783642116315
springer_books_10_1007_978_3_642_11631_5
proquest_ebookcentral_EBC6397483
dipf_primary_917298
ciando_primary_ciando43573
PublicationCentury 2000
PublicationDate 2010
2010-01-30
PublicationDateYYYYMMDD 2010-01-01
2010-01-30
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin
– name: Berlin, Heidelberg
PublicationSeriesTitle Lecture notes of the Institute for Computer Sciences, Social-Informatics und Telecommunications Engineering
PublicationYear 2010
Publisher Springer-Verlag
Springer
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer-Verlag
– name: Springer
– name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
RelatedPersons Dressler, Falko
Shen, Xuemin (Sherman)
Xiaohua, Jia
Zomaya, Albert
Ferrari, Domenico
Kobayashi, Hisashi
Cao, Jiannong
Palazzo, Sergio
Stan, Mircea
Coulson, Geoffrey
Gerla, Mario
Akan, Ozgur
Bellavista, Paolo
Sahni, Sartaj
RelatedPersons_xml – sequence: 1
  givenname: Ozgur
  surname: Akan
  fullname: Akan, Ozgur
  organization: Middle East, Technical University, Turkey
– sequence: 2
  givenname: Paolo
  surname: Bellavista
  fullname: Bellavista, Paolo
  organization: University of Bologna, Italy
– sequence: 3
  givenname: Jiannong
  surname: Cao
  fullname: Cao, Jiannong
  organization: Hong Kong Polytechnic University, Hong Kong
– sequence: 4
  givenname: Falko
  surname: Dressler
  fullname: Dressler, Falko
  organization: University of Erlangen, Germany
– sequence: 5
  givenname: Domenico
  surname: Ferrari
  fullname: Ferrari, Domenico
  organization: Università Cattolica Piacenza, Italy
– sequence: 6
  givenname: Mario
  surname: Gerla
  fullname: Gerla, Mario
  organization: UCLA, USA
– sequence: 7
  givenname: Hisashi
  surname: Kobayashi
  fullname: Kobayashi, Hisashi
  organization: Princeton University, USA
– sequence: 8
  givenname: Sergio
  surname: Palazzo
  fullname: Palazzo, Sergio
  organization: University of Catania, Italy
– sequence: 9
  givenname: Sartaj
  surname: Sahni
  fullname: Sahni, Sartaj
  organization: University of Florida, USA
– sequence: 10
  givenname: Xuemin (Sherman)
  surname: Shen
  fullname: Shen, Xuemin (Sherman)
  organization: University of Waterloo, Canada
– sequence: 11
  givenname: Mircea
  surname: Stan
  fullname: Stan, Mircea
  organization: University of Virginia, USA
– sequence: 12
  givenname: Jia
  surname: Xiaohua
  fullname: Xiaohua, Jia
  organization: City University of Hong Kong, Hong Kong
– sequence: 13
  givenname: Albert
  surname: Zomaya
  fullname: Zomaya, Albert
  organization: University of Sydney, Australia
– sequence: 14
  givenname: Geoffrey
  surname: Coulson
  fullname: Coulson, Geoffrey
  organization: Lancaster University, UK
SSID ssj0000355573
ssib023167542
ssj0000608566
Score 2.2215378
Snippet This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009. The 40...
Table of Contents: Session 1: Politics - Legislation - Regulatory. Framework I: Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, and Anastasios...
This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics...
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information...
SourceID askewsholts
springer
proquest
dipf
ciando
SourceType Aggregation Database
Publisher
SubjectTerms Computer
Computer Appl. in Administrative Data Processing
Computer Appl. in Social and Behavioral Sciences
Computer Science
Computers and Society
Datenschutz
Digitalisierung
e-Commerce/e-business
Economics
Educational Technology
Erkenntnistheorie
Europäische Union
Gesellschaft
Gesetzgebung
Informationsgesellschaft
Informationssystem
Internet
Internet-Law and legislation-Congresses
Lebensqualität
Netzwerk
Partizipation
Politische Kultur
Politische Willensbildung
Politisches System
Public Administration
Regionalplanung
Schule
Soziale Ungleichheit
Soziales Netzwerk
Wahlkampf
Wissensgesellschaft
Subtitle Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers
TableOfContents Information Systems Security Management: A Review and a Classification of the ISO Standards -- Introduction -- Information Security Management Systems Standards -- Concepts and Models for Information and Communications Technology (ICT) Security Management -- Information Security Management Systems -- Information Security Risk Management Standard -- Information Security Management Specific Areas' Standards -- Network Security Management -- Auditing -- Trusted Third Parties (TTPs) -- Incident Management -- Business Continuity -- Non-repudiation -- Digital Signatures -- Access Control -- Cryptographic Controls -- Systems Security Engineering -- Assurance and Evaluation -- Classification of Information Security Management Standards -- Limitations and Further Research -- References -- Web Server Security on Open Source Environments -- Introduction -- Facing Security Issues on the Front Line -- File Permissions -- Shielding Your Server with SSL -- Logging Critical Information -- Password Management and Backups -- VPN Usage for Extra Security -- Pioneering Security Mechanisms -- Building Your Own Honey Pots -- Password-Less Login Using RSA Keys -- Port-Knocking -- File System Encryption -- Conclusions and Future Work -- References -- Session 7 e-Government and Local e-Government -- e-Government Readiness, Strategy and Two Different User Groups - in Austria -- Introduction -- The Austrian e-Government Strategy -- e-Government Readiness -- Two Different e-Government User Groups in Austria -- User Group 1: The Municipalities -- User Group 2: Adolescent Citizens -- Lessons Learned -- References -- On e-Government Project Development in Balmeda -- Introduction -- The Environment -- The General Projects Office -- The Main Story -- Call for Tender Phase -- Requirements Collection -- Development -- Testing -- Analysis and Conclusions -- References
A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States
Sample and Data Collection -- Results and Discussion -- Concluding Remarks -- References -- Session 3 Politics - Legislation - Regulatory Framework II -- Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems -- Introduction -- Positivism and Interpretivism -- Analysis of e-Government Literature and Implications -- Conclusions -- References -- Session 4 Supporting Democracy through e-Services -- e-Campaigning: The Present and Future -- Introduction -- The McCain Campaign -- The Obama Campaign -- Obama on Facebook -- Generation Obama -- Obama Mobile -- Obama on Twitter -- Advertising in Video Games -- Public Involvement -- Vote Different -- Obama Girl -- The Future of e-Campaigning -- World Internet Usage Statistics -- Providing Web Accessibility for Everyone -- e-Voting -- Representative Interaction Websites -- Web 2.0 Technologies -- Web Feeds -- Wikis -- Mashups -- Folksonomies -- e-Campaigning and e-Democracy -- Conclusion -- References -- e-Democracy: The Political Culture of Tomorrow's Citizens -- Introduction -- Aim -- Method -- Data Collection -- Data Analysis -- Results -- The Effect of Internet on Students and the Factors That Influence It -- Students Opinions for e-Democracy -- The Opinions of Students Opposed to Those of Their Teachers -- Conclusions -- References -- Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network -- Introduction -- Electronic Voting -- Parademo as a Large-Scale Decision Making System for Communities -- Basic Concepts of Parademo -- Roles -- Groups -- Algorithms -- Algorithm to Calculate the Weight of Proposals -- Algorithm for Automated Reputation Feedback -- Listeners on Information Streams within Communities -- Summary and Future Work -- References
Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting -- Introduction -- Related Work -- Model for eParticipation Application Design -- Telep@b Project -- Telep@b Portal -- Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project -- Conclusions -- References -- Stakeholder e-Participation in Local Planning: The Camargue Park Case -- Introduction -- Internet Potential for Participation in Local Planning -- Public Participation in Local Planning -- Internet Potential for Local Planning Participation -- Context and Tools of Camargue e-Consultation -- Institutional and Social Context of the Camargue e-Consultation -- e-Tools for Costless and More Deliberative Planning Debate -- Evaluation Design of the e-Consultation Features and Outcomes -- Hypotheses -- Evaluation Design -- First Results -- Conclusion -- References -- Session 5 Identity Management, Privacy and Trust -- Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems -- Introduction -- Existing Implementations and Related Work -- Federated Identity Management System -- Privacy-Aware Mobile Framework -- Usage Scenario of SecIdAM -- Conclusions -- References -- Economics of Personal Data Management: Fair Personal Information Trades -- Introduction -- Fair Personal Information Trades -- Concepts and Architecture -- Personal Data Management in FPIT -- FPIT-Users -- Payments in FPIT -- Trading Process in FPIT -- The FPIT Prototype -- Discussion -- References -- Evaluating Common Privacy Vulnerabilities in Internet Service Providers -- Introduction -- Privacy Related Critical Systems and Threats -- Privacy-Specific Threats -- Common Privacy Related Vulnerabilities and Possible Measures -- User Account Management -- Logging and Auditing
Contractors and Third Parties -- Perimeter and Network Security -- System and Network Maintenance -- Conclusion -- References -- Intellectual Property Rights Protection in Peer to Peer Networks -- Introduction -- IPR Protection - Watermarking and Keys -- Copyright Protection through Watermarking -- Generating Keys with the Watermarking Algorithm -- Watermarking Keys and the P2P Network -- NBDT P2P Network -- Conclusions -- References -- Session 6 Security, Attacks and Crime -- Information Assurance and Forensic Readiness -- Introduction -- The Audit Process -- Forensic Readiness and the Digital Forensics Process -- Analysis and Discussion -- The Security Auditor Needs to Revisit the Risk Analysis Paradigm -- Redress -- Business Continuity and Forensic Readiness -- Well Established Roles in Forensics -- Forensics on the Security Policies -- Conclusions -- References -- An Ontology-Driven antiSPIT Architecture -- Introduction -- Spam over Internet Telephony (SPIT) -- A Proposed Anti-SPIT Architecture -- Anti-SPIT Policies -- The OntoSPIT Model -- SPIT Management Architecture -- Use of the Architecture -- Architecture Evaluation -- Conclusions and Further Research -- References -- Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? -- Introduction -- Random Graphs -- First and Second Order Logic and Relationships -- First Order Language of Graphs -- Second Order Language of Graphs -- Probability Theory - Undecidable Probabilities -- The Self-referential Nature of Trust -- Discussion -- References -- Biological Aspects of Computer Virology -- Introduction -- Related Work -- Infection Propagator -- Vulnerability Prevalence -- Age of the Vulnerability at Time of Exploitation -- Exploitation Difficulty -- Target Locator -- WormVirulence -- Computer Epidemiology -- Conclusion -- References
Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Session 1 Politics - Legislation - Regulatory Framework I -- A Study on the Lack of Enforcement of Data Protection Acts -- Introduction -- Background -- Related Work -- Legal Background -- Study Setup -- Study Results -- The Privacy Policy -- Request for Consent -- Request for Information -- The Right of Deletion -- Conclusions -- References -- The Impact of the Web and Political Balance to e-Democracy -- Introduction -- Web, State and Political Movements -- Web and the Democratic Deficit Condition -- Web and Collective Action -- The Limits of Democracy -- Crisis or Reinforcement of Balance -- New Forms of Political Balance -- Conclusions -- References -- Using Structured e-Forum to Support the Legislation Formation Process -- Introduction -- Background -- Research Methodology -- The Austrian Parliament Pilot -- The Greek Parliament Pilot -- Conclusions -- References -- Session 2 Enhancing Quality of Life through e-Services -- From the Digital Divide to Digital Inequality: A Secondary Research in the European Union -- Introduction -- Determinant Factors of the Digital Divide -- Forms of Digital Inequality -- Methodological Approach -- Findings -- Conclusion -- References -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The"Green" Ultimate Solution for an Ever Improving Life Quality and Safety? -- Introduction -- Inkjet-Printed SW-CNT -- RFID-Enabled "Green" Wireless Sensor Node Module -- Conclusions -- References -- Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective -- Introduction -- Theoretical Framework -- e-Procurement -- Diffusion of Innovation -- The Perceived Characteristics of Innovating -- Research Design -- Research Setting -- Research Instrument
Title Next Generation Society Technological and Legal Issues
URI http://ebooks.ciando.com/book/index.cfm/bok_id/43573
http://www.fachportal-paedagogik.de/fis_bildung/suche/fis_set.html?FId=917298
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6397483
http://link.springer.com/10.1007/978-3-642-11631-5
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642116315
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb9MwFLZYeYC9AGWIlosshBASytTGdi4PPMBUNE2l4qFMe7PixJkQqJ2WDAl-PZ9vSTomBLxErdPajs_JudjnfIeQl7VKsmKm6ygtIQI5POYorxIWFbUBkyvmPLXlgD6ukuPP_ORMnPX1O212SasOy5835pX8D1XRBrqaLNl_oGzXKRrwGfTFFRTG9Zrxe6OeWUGwetxo9967CMzDfr-8gwJY6nMDqmFL7TlBYgCOm7dLf4Sw2rYOfdYFU4YAAhODGOo-BDFgCe-zen0yUwf1vDZVdYYpJ80Q8HC4w2AD1YY7DGGH8c0fALhsMgiHM5nE-WC70qDlRVnsxakettki6p0Mdlnzv4nzYQQHuo_QP5tHotddXUShqWYbp3tkL83jEbn9bnGyPA1yJTbZ_qHQr9XQMLKEN9ucxobhaY-1uwmbNKDwQLkDauofMJyOe4Dinbntk_2i-QoFBeXVNrBrzOZUtTUlIb5c1Dt-zLWjd2vRrO-Tgz7Xk37quOsBuaU3Y3LPOyc00BxNgQ9C25jcCVntuD3tMp_oK-q4gzoImh8PSWo4lfacSgOn0h1OpXgEajmVOk49IKcfFuuj48hX7IgKbnCTorJU8AHg5calEiyvBBMaa63haDDr_IpUwaLmEB0zNKiU1YXSxghlFc9LxR6R0Wa70Y8JLXhVz1TBk0JrrmDH85KpquJpLXSGtZ6QF4OFlt-_2eiCRvaUYnMxIVO3_vLCgbdI99VMBD2MDU26WzmM-TybEBpIJG2XPkpaLt4fmVNwnuGPrwPppBs0gH9jcMkkhpd2fCmmf__TJ-Ru__Y9JaP28ko_g8XbqueeoX8Bnk-drw
link.rule.ids 307,308,310,783,787,789,790,792,4056,4058,27938
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Next+Generation+Society.+Technological+and+Legal+Issues&rft.series=Lecture+Notes+of+the+Institute+for+Computer+Sciences%2C+Social+Informatics+and+Telecommunications+Engineering&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642116292&rft.issn=1867-8211&rft.eissn=1867-822X&rft.volume=26&rft_id=info:doi/10.1007%2F978-3-642-11631-5&rft.externalDocID=195027
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.askewsandholts.com%2Fuploads%2Fproduct%2Fimages%2Ffull%2F6315%2F9783642116315.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-11631-5