Next Generation Society. Technological and Legal Issues Technological and Legal Issues : Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009 : Revised Selected Papers
This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.
Saved in:
Main Authors | , , |
---|---|
Format | eBook |
Language | English |
Published |
Berlin/Heidelberg
Springer
2010
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services. |
---|---|
AbstractList | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services. |
Author | Patrikakis, Charalampos Z Cao, Jiannong Sideridis, Alexander B |
Author_xml | – sequence: 1 fullname: Sideridis, Alexander B – sequence: 2 fullname: Patrikakis, Charalampos Z – sequence: 3 fullname: Cao, Jiannong |
BookMark | eNqNjr0OgjAcxGv8iKC8Qyc3DaW2pasEPxLjIjup-BfRplVaE317GXwAb7n75W64EA2MNdBDkRQp5cuEEE4J66PwB4mUIxRwTmPJU5KOUeTcLe5EGWOCBkgc4O3xBgy0yjfW4KOtGvCfBS6guhqrbd1USmNlzngPdZd2zr3ATdHworSD6OcTNFvnRbadP1r77HpfwsnaewXGt0qX-Spjgoju5N_DL5ZXPyI |
ContentType | eBook |
DEWEY | 005.1 303.4834 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics Applied Sciences Library & Information Science Computer Science Sociology & Social History Social Sciences (General) |
EISBN | 9783642116315 3642116310 |
ExternalDocumentID | EBC571778 |
GroupedDBID | -T. 089 0D6 0DA 0E8 20A 38. 4UP 4V3 9-Z A4J AABBV AAFYB ABBVZ ABMKK ABMNI ACDPG ACWCF ACZTO ADVHH AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS BBABE BC- CZZ I4C IEZ JJU MA. MYL NUC OV6 SAO SBO TBMHI TPJZQ |
ID | FETCH-proquest_ebookcentral_EBC5717783 |
ISBN | 3642116299 9783642116292 |
IngestDate | Tue Feb 20 07:14:38 EST 2024 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | HC79.I55 -- N49 2010eb |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-proquest_ebookcentral_EBC5717783 |
OCLC | 663096818 |
PQID | EBC571778 |
PageCount | 452 |
ParticipantIDs | proquest_ebookcentral_EBC571778 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Berlin/Heidelberg |
PublicationPlace_xml | – name: Berlin/Heidelberg |
PublicationYear | 2010 |
Publisher | Springer |
Publisher_xml | – name: Springer |
SSID | ssj0000355573 |
Score | 3.716948 |
Snippet | This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics... |
SourceID | proquest |
SourceType | Publisher |
SubjectTerms | Congresses Information superhighway Information technology |
Subtitle | Technological and Legal Issues : Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009 : Revised Selected Papers |
TableOfContents | Contractors and Third Parties -- Perimeter and Network Security -- System and Network Maintenance -- Conclusion -- References -- Intellectual Property Rights Protection in Peer to Peer Networks -- Introduction -- IPR Protection - Watermarking and Keys -- Copyright Protection through Watermarking -- Generating Keys with the Watermarking Algorithm -- Watermarking Keys and the P2P Network -- NBDT P2P Network -- Conclusions -- References -- Session 6 Security, Attacks and Crime -- Information Assurance and Forensic Readiness -- Introduction -- The Audit Process -- Forensic Readiness and the Digital Forensics Process -- Analysis and Discussion -- The Security Auditor Needs to Revisit the Risk Analysis Paradigm -- Redress -- Business Continuity and Forensic Readiness -- Well Established Roles in Forensics -- Forensics on the Security Policies -- Conclusions -- References -- An Ontology-Driven antiSPIT Architecture -- Introduction -- Spam over Internet Telephony (SPIT) -- A Proposed Anti-SPIT Architecture -- Anti-SPIT Policies -- The OntoSPIT Model -- SPIT Management Architecture -- Use of the Architecture -- Architecture Evaluation -- Conclusions and Further Research -- References -- Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? -- Introduction -- Random Graphs -- First and Second Order Logic and Relationships -- First Order Language of Graphs -- Second Order Language of Graphs -- Probability Theory - Undecidable Probabilities -- The Self-referential Nature of Trust -- Discussion -- References -- Biological Aspects of Computer Virology -- Introduction -- Related Work -- Infection Propagator -- Vulnerability Prevalence -- Age of the Vulnerability at Time of Exploitation -- Exploitation Difficulty -- Target Locator -- WormVirulence -- Computer Epidemiology -- Conclusion -- References Information Systems Security Management: A Review and a Classification of the ISO Standards -- Introduction -- Information Security Management Systems Standards -- Concepts and Models for Information and Communications Technology (ICT) Security Management -- Information Security Management Systems -- Information Security Risk Management Standard -- Information Security Management Specific Areas' Standards -- Network Security Management -- Auditing -- Trusted Third Parties (TTPs) -- Incident Management -- Business Continuity -- Non-repudiation -- Digital Signatures -- Access Control -- Cryptographic Controls -- Systems Security Engineering -- Assurance and Evaluation -- Classification of Information Security Management Standards -- Limitations and Further Research -- References -- Web Server Security on Open Source Environments -- Introduction -- Facing Security Issues on the Front Line -- File Permissions -- Shielding Your Server with SSL -- Logging Critical Information -- Password Management and Backups -- VPN Usage for Extra Security -- Pioneering Security Mechanisms -- Building Your Own Honey Pots -- Password-Less Login Using RSA Keys -- Port-Knocking -- File System Encryption -- Conclusions and Future Work -- References -- Session 7 e-Government and Local e-Government -- e-Government Readiness, Strategy and Two Different User Groups - in Austria -- Introduction -- The Austrian e-Government Strategy -- e-Government Readiness -- Two Different e-Government User Groups in Austria -- User Group 1: The Municipalities -- User Group 2: Adolescent Citizens -- Lessons Learned -- References -- On e-Government Project Development in Balmeda -- Introduction -- The Environment -- The General Projects Office -- The Main Story -- Call for Tender Phase -- Requirements Collection -- Development -- Testing -- Analysis and Conclusions -- References A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States Title Page -- Preface -- Organization -- Table of Contents -- Session 1 Politics - Legislation - Regulatory Framework I -- A Study on the Lack of Enforcement of Data Protection Acts -- Introduction -- Background -- Related Work -- Legal Background -- Study Setup -- Study Results -- The Privacy Policy -- Request for Consent -- Request for Information -- The Right of Deletion -- Conclusions -- References -- The Impact of the Web and Political Balance to e-Democracy -- Introduction -- Web, State and Political Movements -- Web and the Democratic Deficit Condition -- Web and Collective Action -- The Limits of Democracy -- Crisis or Reinforcement of Balance -- New Forms of Political Balance -- Conclusions -- References -- Using Structured e-Forum to Support the Legislation Formation Process -- Introduction -- Background -- Research Methodology -- The Austrian Parliament Pilot -- The Greek Parliament Pilot -- Conclusions -- References -- Session 2 Enhancing Quality of Life through e-Services -- From the Digital Divide to Digital Inequality: A Secondary Research in the European Union -- Introduction -- Determinant Factors of the Digital Divide -- Forms of Digital Inequality -- Methodological Approach -- Findings -- Conclusion -- References -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The"Green" Ultimate Solution for an Ever Improving Life Quality and Safety? -- Introduction -- Inkjet-Printed SW-CNT -- RFID-Enabled "Green" Wireless Sensor Node Module -- Conclusions -- References -- Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective -- Introduction -- Theoretical Framework -- e-Procurement -- Diffusion of Innovation -- The Perceived Characteristics of Innovating -- Research Design -- Research Setting -- Research Instrument Sample and Data Collection -- Results and Discussion -- Concluding Remarks -- References -- Session 3 Politics - Legislation - Regulatory Framework II -- Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems -- Introduction -- Positivism and Interpretivism -- Analysis of e-Government Literature and Implications -- Conclusions -- References -- Session 4 Supporting Democracy through e-Services -- e-Campaigning: The Present and Future -- Introduction -- The McCain Campaign -- The Obama Campaign -- Obama on Facebook -- Generation Obama -- Obama Mobile -- Obama on Twitter -- Advertising in Video Games -- Public Involvement -- Vote Different -- Obama Girl -- The Future of e-Campaigning -- World Internet Usage Statistics -- Providing Web Accessibility for Everyone -- e-Voting -- Representative Interaction Websites -- Web 2.0 Technologies -- Web Feeds -- Wikis -- Mashups -- Folksonomies -- e-Campaigning and e-Democracy -- Conclusion -- References -- e-Democracy: The Political Culture of Tomorrow's Citizens -- Introduction -- Aim -- Method -- Data Collection -- Data Analysis -- Results -- The Effect of Internet on Students and the Factors That Influence It -- Students Opinions for e-Democracy -- The Opinions of Students Opposed to Those of Their Teachers -- Conclusions -- References -- Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network -- Introduction -- Electronic Voting -- Parademo as a Large-Scale Decision Making System for Communities -- Basic Concepts of Parademo -- Roles -- Groups -- Algorithms -- Algorithm to Calculate the Weight of Proposals -- Algorithm for Automated Reputation Feedback -- Listeners on Information Streams within Communities -- Summary and Future Work -- References Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting -- Introduction -- Related Work -- Model for eParticipation Application Design -- Telep@b Project -- Telep@b Portal -- Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project -- Conclusions -- References -- Stakeholder e-Participation in Local Planning: The Camargue Park Case -- Introduction -- Internet Potential for Participation in Local Planning -- Public Participation in Local Planning -- Internet Potential for Local Planning Participation -- Context and Tools of Camargue e-Consultation -- Institutional and Social Context of the Camargue e-Consultation -- e-Tools for Costless and More Deliberative Planning Debate -- Evaluation Design of the e-Consultation Features and Outcomes -- Hypotheses -- Evaluation Design -- First Results -- Conclusion -- References -- Session 5 Identity Management, Privacy and Trust -- Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems -- Introduction -- Existing Implementations and Related Work -- Federated Identity Management System -- Privacy-Aware Mobile Framework -- Usage Scenario of SecIdAM -- Conclusions -- References -- Economics of Personal Data Management: Fair Personal Information Trades -- Introduction -- Fair Personal Information Trades -- Concepts and Architecture -- Personal Data Management in FPIT -- FPIT-Users -- Payments in FPIT -- Trading Process in FPIT -- The FPIT Prototype -- Discussion -- References -- Evaluating Common Privacy Vulnerabilities in Internet Service Providers -- Introduction -- Privacy Related Critical Systems and Threats -- Privacy-Specific Threats -- Common Privacy Related Vulnerabilities and Possible Measures -- User Account Management -- Logging and Auditing |
Title | Next Generation Society. Technological and Legal Issues |
URI | https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=571778 |
Volume | v.v. 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEJ4IHPSkokZQdA-GaAyNpY9tj0owhKAnNNxIn8aQgJFK1F_v7FvQhOilabfbbdpvH7Oz-30DcJYkduK5btyiOW0zUW1scwk299Bx88gPAt_jwSbu7v3eg9sfeSMTvZWzS4rYSj5_5ZX8B1VMQ1wZS_YPyOpCMQHPEV88IsJ4XDF-9aUSW3ovpGK0aPFi76VlPOVaBGCQPTE5DR5kT7tTGPfuOZWRiBXFxQRg5rr9E2ZbqhX5CCvOy2xu1jE6kViywdo1ncnRTzoP-B60784D5TxcmlQ6jPtq--1wqZdcWAvrsr2iWs3Hwe5Nx8NJIQ1KUKIB9iyV625_8Kg9XVdo0niUBdTQJYdC-si86cdIyIf34Q5UMsb52IWNbFqFbWmZE9nvzTFJBb9QaVXYVJRuvN2Q7A_SJJLexVAxeWuCBK0LJOdS7fuiCnVNGcKnZT6h3fKxB5QBTQzQRAFNloAmiB_hQBMB9D40b7vDTq-lPnfMF8XlTtyx_pfOAZQRvuwQiMvCIzlMey9PXZvGUeTnme2naeCFKfbJNThdU1h9bY4j2DLV4xjKxetb1kBrq4hPJJxf2h8w3w |
link.rule.ids | 307,783,787,789 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Next+Generation+Society.+Technological+and+Legal+Issues&rft.au=Sideridis%2C+Alexander+B&rft.au=Patrikakis%2C+Charalampos+Z&rft.au=Cao%2C+Jiannong&rft.date=2010-01-01&rft.pub=Springer&rft.isbn=9783642116292&rft.volume=v.v.+26&rft.externalDocID=EBC571778 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783642116292/sc.gif&client=summon&freeimage=true |