Next Generation Society. Technological and Legal Issues Technological and Legal Issues : Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009 : Revised Selected Papers

This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.

Saved in:
Bibliographic Details
Main Authors Sideridis, Alexander B, Patrikakis, Charalampos Z, Cao, Jiannong
Format eBook
LanguageEnglish
Published Berlin/Heidelberg Springer 2010
Subjects
Online AccessGet full text

Cover

Loading…
Table of Contents:
  • Contractors and Third Parties -- Perimeter and Network Security -- System and Network Maintenance -- Conclusion -- References -- Intellectual Property Rights Protection in Peer to Peer Networks -- Introduction -- IPR Protection - Watermarking and Keys -- Copyright Protection through Watermarking -- Generating Keys with the Watermarking Algorithm -- Watermarking Keys and the P2P Network -- NBDT P2P Network -- Conclusions -- References -- Session 6 Security, Attacks and Crime -- Information Assurance and Forensic Readiness -- Introduction -- The Audit Process -- Forensic Readiness and the Digital Forensics Process -- Analysis and Discussion -- The Security Auditor Needs to Revisit the Risk Analysis Paradigm -- Redress -- Business Continuity and Forensic Readiness -- Well Established Roles in Forensics -- Forensics on the Security Policies -- Conclusions -- References -- An Ontology-Driven antiSPIT Architecture -- Introduction -- Spam over Internet Telephony (SPIT) -- A Proposed Anti-SPIT Architecture -- Anti-SPIT Policies -- The OntoSPIT Model -- SPIT Management Architecture -- Use of the Architecture -- Architecture Evaluation -- Conclusions and Further Research -- References -- Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? -- Introduction -- Random Graphs -- First and Second Order Logic and Relationships -- First Order Language of Graphs -- Second Order Language of Graphs -- Probability Theory - Undecidable Probabilities -- The Self-referential Nature of Trust -- Discussion -- References -- Biological Aspects of Computer Virology -- Introduction -- Related Work -- Infection Propagator -- Vulnerability Prevalence -- Age of the Vulnerability at Time of Exploitation -- Exploitation Difficulty -- Target Locator -- WormVirulence -- Computer Epidemiology -- Conclusion -- References
  • Information Systems Security Management: A Review and a Classification of the ISO Standards -- Introduction -- Information Security Management Systems Standards -- Concepts and Models for Information and Communications Technology (ICT) Security Management -- Information Security Management Systems -- Information Security Risk Management Standard -- Information Security Management Specific Areas' Standards -- Network Security Management -- Auditing -- Trusted Third Parties (TTPs) -- Incident Management -- Business Continuity -- Non-repudiation -- Digital Signatures -- Access Control -- Cryptographic Controls -- Systems Security Engineering -- Assurance and Evaluation -- Classification of Information Security Management Standards -- Limitations and Further Research -- References -- Web Server Security on Open Source Environments -- Introduction -- Facing Security Issues on the Front Line -- File Permissions -- Shielding Your Server with SSL -- Logging Critical Information -- Password Management and Backups -- VPN Usage for Extra Security -- Pioneering Security Mechanisms -- Building Your Own Honey Pots -- Password-Less Login Using RSA Keys -- Port-Knocking -- File System Encryption -- Conclusions and Future Work -- References -- Session 7 e-Government and Local e-Government -- e-Government Readiness, Strategy and Two Different User Groups - in Austria -- Introduction -- The Austrian e-Government Strategy -- e-Government Readiness -- Two Different e-Government User Groups in Austria -- User Group 1: The Municipalities -- User Group 2: Adolescent Citizens -- Lessons Learned -- References -- On e-Government Project Development in Balmeda -- Introduction -- The Environment -- The General Projects Office -- The Main Story -- Call for Tender Phase -- Requirements Collection -- Development -- Testing -- Analysis and Conclusions -- References
  • A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States
  • Title Page -- Preface -- Organization -- Table of Contents -- Session 1 Politics - Legislation - Regulatory Framework I -- A Study on the Lack of Enforcement of Data Protection Acts -- Introduction -- Background -- Related Work -- Legal Background -- Study Setup -- Study Results -- The Privacy Policy -- Request for Consent -- Request for Information -- The Right of Deletion -- Conclusions -- References -- The Impact of the Web and Political Balance to e-Democracy -- Introduction -- Web, State and Political Movements -- Web and the Democratic Deficit Condition -- Web and Collective Action -- The Limits of Democracy -- Crisis or Reinforcement of Balance -- New Forms of Political Balance -- Conclusions -- References -- Using Structured e-Forum to Support the Legislation Formation Process -- Introduction -- Background -- Research Methodology -- The Austrian Parliament Pilot -- The Greek Parliament Pilot -- Conclusions -- References -- Session 2 Enhancing Quality of Life through e-Services -- From the Digital Divide to Digital Inequality: A Secondary Research in the European Union -- Introduction -- Determinant Factors of the Digital Divide -- Forms of Digital Inequality -- Methodological Approach -- Findings -- Conclusion -- References -- Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The"Green" Ultimate Solution for an Ever Improving Life Quality and Safety? -- Introduction -- Inkjet-Printed SW-CNT -- RFID-Enabled "Green" Wireless Sensor Node Module -- Conclusions -- References -- Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective -- Introduction -- Theoretical Framework -- e-Procurement -- Diffusion of Innovation -- The Perceived Characteristics of Innovating -- Research Design -- Research Setting -- Research Instrument
  • Sample and Data Collection -- Results and Discussion -- Concluding Remarks -- References -- Session 3 Politics - Legislation - Regulatory Framework II -- Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems -- Introduction -- Positivism and Interpretivism -- Analysis of e-Government Literature and Implications -- Conclusions -- References -- Session 4 Supporting Democracy through e-Services -- e-Campaigning: The Present and Future -- Introduction -- The McCain Campaign -- The Obama Campaign -- Obama on Facebook -- Generation Obama -- Obama Mobile -- Obama on Twitter -- Advertising in Video Games -- Public Involvement -- Vote Different -- Obama Girl -- The Future of e-Campaigning -- World Internet Usage Statistics -- Providing Web Accessibility for Everyone -- e-Voting -- Representative Interaction Websites -- Web 2.0 Technologies -- Web Feeds -- Wikis -- Mashups -- Folksonomies -- e-Campaigning and e-Democracy -- Conclusion -- References -- e-Democracy: The Political Culture of Tomorrow's Citizens -- Introduction -- Aim -- Method -- Data Collection -- Data Analysis -- Results -- The Effect of Internet on Students and the Factors That Influence It -- Students Opinions for e-Democracy -- The Opinions of Students Opposed to Those of Their Teachers -- Conclusions -- References -- Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network -- Introduction -- Electronic Voting -- Parademo as a Large-Scale Decision Making System for Communities -- Basic Concepts of Parademo -- Roles -- Groups -- Algorithms -- Algorithm to Calculate the Weight of Proposals -- Algorithm for Automated Reputation Feedback -- Listeners on Information Streams within Communities -- Summary and Future Work -- References
  • Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting -- Introduction -- Related Work -- Model for eParticipation Application Design -- Telep@b Project -- Telep@b Portal -- Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project -- Conclusions -- References -- Stakeholder e-Participation in Local Planning: The Camargue Park Case -- Introduction -- Internet Potential for Participation in Local Planning -- Public Participation in Local Planning -- Internet Potential for Local Planning Participation -- Context and Tools of Camargue e-Consultation -- Institutional and Social Context of the Camargue e-Consultation -- e-Tools for Costless and More Deliberative Planning Debate -- Evaluation Design of the e-Consultation Features and Outcomes -- Hypotheses -- Evaluation Design -- First Results -- Conclusion -- References -- Session 5 Identity Management, Privacy and Trust -- Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems -- Introduction -- Existing Implementations and Related Work -- Federated Identity Management System -- Privacy-Aware Mobile Framework -- Usage Scenario of SecIdAM -- Conclusions -- References -- Economics of Personal Data Management: Fair Personal Information Trades -- Introduction -- Fair Personal Information Trades -- Concepts and Architecture -- Personal Data Management in FPIT -- FPIT-Users -- Payments in FPIT -- Trading Process in FPIT -- The FPIT Prototype -- Discussion -- References -- Evaluating Common Privacy Vulnerabilities in Internet Service Providers -- Introduction -- Privacy Related Critical Systems and Threats -- Privacy-Specific Threats -- Common Privacy Related Vulnerabilities and Possible Measures -- User Account Management -- Logging and Auditing