Next Generation Society. Technological and Legal Issues Technological and Legal Issues : Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009 : Revised Selected Papers

This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.

Saved in:
Bibliographic Details
Main Authors Sideridis, Alexander B, Patrikakis, Charalampos Z, Cao, Jiannong
Format eBook
LanguageEnglish
Published Berlin/Heidelberg Springer 2010
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.
AbstractList This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.
Author Patrikakis, Charalampos Z
Cao, Jiannong
Sideridis, Alexander B
Author_xml – sequence: 1
  fullname: Sideridis, Alexander B
– sequence: 2
  fullname: Patrikakis, Charalampos Z
– sequence: 3
  fullname: Cao, Jiannong
BookMark eNqNjr0OgjAcxGv8iKC8Qyc3DaW2pasEPxLjIjup-BfRplVaE317GXwAb7n75W64EA2MNdBDkRQp5cuEEE4J66PwB4mUIxRwTmPJU5KOUeTcLe5EGWOCBkgc4O3xBgy0yjfW4KOtGvCfBS6guhqrbd1USmNlzngPdZd2zr3ATdHworSD6OcTNFvnRbadP1r77HpfwsnaewXGt0qX-Spjgoju5N_DL5ZXPyI
ContentType eBook
DEWEY 005.1
303.4834
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Economics
Applied Sciences
Library & Information Science
Computer Science
Sociology & Social History
Social Sciences (General)
EISBN 9783642116315
3642116310
ExternalDocumentID EBC571778
GroupedDBID -T.
089
0D6
0DA
0E8
20A
38.
4UP
4V3
9-Z
A4J
AABBV
AAFYB
ABBVZ
ABMKK
ABMNI
ACDPG
ACWCF
ACZTO
ADVHH
AEKFX
AEOKE
AETDV
AEZAY
AHSMR
ALMA_UNASSIGNED_HOLDINGS
BBABE
BC-
CZZ
I4C
IEZ
JJU
MA.
MYL
NUC
OV6
SAO
SBO
TBMHI
TPJZQ
ID FETCH-proquest_ebookcentral_EBC5717783
ISBN 3642116299
9783642116292
IngestDate Tue Feb 20 07:14:38 EST 2024
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident HC79.I55 -- N49 2010eb
Language English
LinkModel OpenURL
MergedId FETCHMERGED-proquest_ebookcentral_EBC5717783
OCLC 663096818
PQID EBC571778
PageCount 452
ParticipantIDs proquest_ebookcentral_EBC571778
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
PublicationYear 2010
Publisher Springer
Publisher_xml – name: Springer
SSID ssj0000355573
Score 3.716948
Snippet This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics...
SourceID proquest
SourceType Publisher
SubjectTerms Congresses
Information superhighway
Information technology
Subtitle Technological and Legal Issues : Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009 : Revised Selected Papers
TableOfContents Contractors and Third Parties -- Perimeter and Network Security -- System and Network Maintenance -- Conclusion -- References -- Intellectual Property Rights Protection in Peer to Peer Networks -- Introduction -- IPR Protection - Watermarking and Keys -- Copyright Protection through Watermarking -- Generating Keys with the Watermarking Algorithm -- Watermarking Keys and the P2P Network -- NBDT P2P Network -- Conclusions -- References -- Session 6 Security, Attacks and Crime -- Information Assurance and Forensic Readiness -- Introduction -- The Audit Process -- Forensic Readiness and the Digital Forensics Process -- Analysis and Discussion -- The Security Auditor Needs to Revisit the Risk Analysis Paradigm -- Redress -- Business Continuity and Forensic Readiness -- Well Established Roles in Forensics -- Forensics on the Security Policies -- Conclusions -- References -- An Ontology-Driven antiSPIT Architecture -- Introduction -- Spam over Internet Telephony (SPIT) -- A Proposed Anti-SPIT Architecture -- Anti-SPIT Policies -- The OntoSPIT Model -- SPIT Management Architecture -- Use of the Architecture -- Architecture Evaluation -- Conclusions and Further Research -- References -- Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? -- Introduction -- Random Graphs -- First and Second Order Logic and Relationships -- First Order Language of Graphs -- Second Order Language of Graphs -- Probability Theory - Undecidable Probabilities -- The Self-referential Nature of Trust -- Discussion -- References -- Biological Aspects of Computer Virology -- Introduction -- Related Work -- Infection Propagator -- Vulnerability Prevalence -- Age of the Vulnerability at Time of Exploitation -- Exploitation Difficulty -- Target Locator -- WormVirulence -- Computer Epidemiology -- Conclusion -- References
Information Systems Security Management: A Review and a Classification of the ISO Standards -- Introduction -- Information Security Management Systems Standards -- Concepts and Models for Information and Communications Technology (ICT) Security Management -- Information Security Management Systems -- Information Security Risk Management Standard -- Information Security Management Specific Areas' Standards -- Network Security Management -- Auditing -- Trusted Third Parties (TTPs) -- Incident Management -- Business Continuity -- Non-repudiation -- Digital Signatures -- Access Control -- Cryptographic Controls -- Systems Security Engineering -- Assurance and Evaluation -- Classification of Information Security Management Standards -- Limitations and Further Research -- References -- Web Server Security on Open Source Environments -- Introduction -- Facing Security Issues on the Front Line -- File Permissions -- Shielding Your Server with SSL -- Logging Critical Information -- Password Management and Backups -- VPN Usage for Extra Security -- Pioneering Security Mechanisms -- Building Your Own Honey Pots -- Password-Less Login Using RSA Keys -- Port-Knocking -- File System Encryption -- Conclusions and Future Work -- References -- Session 7 e-Government and Local e-Government -- e-Government Readiness, Strategy and Two Different User Groups - in Austria -- Introduction -- The Austrian e-Government Strategy -- e-Government Readiness -- Two Different e-Government User Groups in Austria -- User Group 1: The Municipalities -- User Group 2: Adolescent Citizens -- Lessons Learned -- References -- On e-Government Project Development in Balmeda -- Introduction -- The Environment -- The General Projects Office -- The Main Story -- Call for Tender Phase -- Requirements Collection -- Development -- Testing -- Analysis and Conclusions -- References
A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States
Title Page -- Preface -- Organization -- Table of Contents -- Session 1 Politics - Legislation - Regulatory Framework I -- A Study on the Lack of Enforcement of Data Protection Acts -- Introduction -- Background -- Related Work -- Legal Background -- Study Setup -- Study Results -- The Privacy Policy -- Request for Consent -- Request for Information -- The Right of Deletion -- Conclusions -- References -- The Impact of the Web and Political Balance to e-Democracy -- Introduction -- Web, State and Political Movements -- Web and the Democratic Deficit Condition -- Web and Collective Action -- The Limits of Democracy -- Crisis or Reinforcement of Balance -- New Forms of Political Balance -- Conclusions -- References -- Using Structured e-Forum to Support the Legislation Formation Process -- Introduction -- Background -- Research Methodology -- The Austrian Parliament Pilot -- The Greek Parliament Pilot -- Conclusions -- References -- Session 2 Enhancing Quality of Life through e-Services -- From the Digital Divide to Digital Inequality: A Secondary Research in the European Union -- Introduction -- Determinant Factors of the Digital Divide -- Forms of Digital Inequality -- Methodological Approach -- Findings -- Conclusion -- References -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The"Green" Ultimate Solution for an Ever Improving Life Quality and Safety? -- Introduction -- Inkjet-Printed SW-CNT -- RFID-Enabled "Green" Wireless Sensor Node Module -- Conclusions -- References -- Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective -- Introduction -- Theoretical Framework -- e-Procurement -- Diffusion of Innovation -- The Perceived Characteristics of Innovating -- Research Design -- Research Setting -- Research Instrument
Sample and Data Collection -- Results and Discussion -- Concluding Remarks -- References -- Session 3 Politics - Legislation - Regulatory Framework II -- Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems -- Introduction -- Positivism and Interpretivism -- Analysis of e-Government Literature and Implications -- Conclusions -- References -- Session 4 Supporting Democracy through e-Services -- e-Campaigning: The Present and Future -- Introduction -- The McCain Campaign -- The Obama Campaign -- Obama on Facebook -- Generation Obama -- Obama Mobile -- Obama on Twitter -- Advertising in Video Games -- Public Involvement -- Vote Different -- Obama Girl -- The Future of e-Campaigning -- World Internet Usage Statistics -- Providing Web Accessibility for Everyone -- e-Voting -- Representative Interaction Websites -- Web 2.0 Technologies -- Web Feeds -- Wikis -- Mashups -- Folksonomies -- e-Campaigning and e-Democracy -- Conclusion -- References -- e-Democracy: The Political Culture of Tomorrow's Citizens -- Introduction -- Aim -- Method -- Data Collection -- Data Analysis -- Results -- The Effect of Internet on Students and the Factors That Influence It -- Students Opinions for e-Democracy -- The Opinions of Students Opposed to Those of Their Teachers -- Conclusions -- References -- Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network -- Introduction -- Electronic Voting -- Parademo as a Large-Scale Decision Making System for Communities -- Basic Concepts of Parademo -- Roles -- Groups -- Algorithms -- Algorithm to Calculate the Weight of Proposals -- Algorithm for Automated Reputation Feedback -- Listeners on Information Streams within Communities -- Summary and Future Work -- References
Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting -- Introduction -- Related Work -- Model for eParticipation Application Design -- Telep@b Project -- Telep@b Portal -- Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project -- Conclusions -- References -- Stakeholder e-Participation in Local Planning: The Camargue Park Case -- Introduction -- Internet Potential for Participation in Local Planning -- Public Participation in Local Planning -- Internet Potential for Local Planning Participation -- Context and Tools of Camargue e-Consultation -- Institutional and Social Context of the Camargue e-Consultation -- e-Tools for Costless and More Deliberative Planning Debate -- Evaluation Design of the e-Consultation Features and Outcomes -- Hypotheses -- Evaluation Design -- First Results -- Conclusion -- References -- Session 5 Identity Management, Privacy and Trust -- Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems -- Introduction -- Existing Implementations and Related Work -- Federated Identity Management System -- Privacy-Aware Mobile Framework -- Usage Scenario of SecIdAM -- Conclusions -- References -- Economics of Personal Data Management: Fair Personal Information Trades -- Introduction -- Fair Personal Information Trades -- Concepts and Architecture -- Personal Data Management in FPIT -- FPIT-Users -- Payments in FPIT -- Trading Process in FPIT -- The FPIT Prototype -- Discussion -- References -- Evaluating Common Privacy Vulnerabilities in Internet Service Providers -- Introduction -- Privacy Related Critical Systems and Threats -- Privacy-Specific Threats -- Common Privacy Related Vulnerabilities and Possible Measures -- User Account Management -- Logging and Auditing
Title Next Generation Society. Technological and Legal Issues
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=571778
Volume v.v. 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEJ4IHPSkokZQdA-GaAyNpY9tj0owhKAnNNxIn8aQgJFK1F_v7FvQhOilabfbbdpvH7Oz-30DcJYkduK5btyiOW0zUW1scwk299Bx88gPAt_jwSbu7v3eg9sfeSMTvZWzS4rYSj5_5ZX8B1VMQ1wZS_YPyOpCMQHPEV88IsJ4XDF-9aUSW3ovpGK0aPFi76VlPOVaBGCQPTE5DR5kT7tTGPfuOZWRiBXFxQRg5rr9E2ZbqhX5CCvOy2xu1jE6kViywdo1ncnRTzoP-B60784D5TxcmlQ6jPtq--1wqZdcWAvrsr2iWs3Hwe5Nx8NJIQ1KUKIB9iyV625_8Kg9XVdo0niUBdTQJYdC-si86cdIyIf34Q5UMsb52IWNbFqFbWmZE9nvzTFJBb9QaVXYVJRuvN2Q7A_SJJLexVAxeWuCBK0LJOdS7fuiCnVNGcKnZT6h3fKxB5QBTQzQRAFNloAmiB_hQBMB9D40b7vDTq-lPnfMF8XlTtyx_pfOAZQRvuwQiMvCIzlMey9PXZvGUeTnme2naeCFKfbJNThdU1h9bY4j2DLV4xjKxetb1kBrq4hPJJxf2h8w3w
link.rule.ids 307,783,787,789
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Next+Generation+Society.+Technological+and+Legal+Issues&rft.au=Sideridis%2C+Alexander+B&rft.au=Patrikakis%2C+Charalampos+Z&rft.au=Cao%2C+Jiannong&rft.date=2010-01-01&rft.pub=Springer&rft.isbn=9783642116292&rft.volume=v.v.+26&rft.externalDocID=EBC571778
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/sc.gif&client=summon&freeimage=true