E-Book, Englisch, Band 26, 454 Seiten
Sideridis / Patrikakis Next Generation Society Technological and Legal Issues
2010
ISBN: 978-3-642-11631-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers
E-Book, Englisch, Band 26, 454 Seiten
ISBN: 978-3-642-11631-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009.
The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government & local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;7
3;Table of Contents;11
4;Session 1 Politics – Legislation – Regulatory Framework I;15
4.1;A Study on the Lack of Enforcement of Data Protection Acts;16
4.1.1;Introduction;16
4.1.2;Background;17
4.1.2.1;Related Work;17
4.1.2.2;Legal Background;17
4.1.3;Study Setup;18
4.1.4;Study Results;19
4.1.4.1;The Privacy Policy;19
4.1.4.2;Request for Consent;23
4.1.4.3;Request for Information;23
4.1.4.4;The Right of Deletion;24
4.1.5;Conclusions;25
4.1.6;References;25
4.2;The Impact of the Web and Political Balance to e-Democracy;26
4.2.1;Introduction;26
4.2.2;Web, State and Political Movements;28
4.2.2.1;Web and the Democratic Deficit Condition;28
4.2.2.2;Web and Collective Action;30
4.2.3;The Limits of Democracy;32
4.2.4;Crisis or Reinforcement of Balance;34
4.2.5;New Forms of Political Balance;35
4.2.6;Conclusions;39
4.2.7;References;40
4.3;Using Structured e-Forum to Support the Legislation Formation Process;42
4.3.1;Introduction;42
4.3.2;Background;43
4.3.3;Research Methodology;44
4.3.4;The Austrian Parliament Pilot;45
4.3.5;The Greek Parliament Pilot;49
4.3.6;Conclusions;51
4.3.7;References;52
5;Session 2 Enhancing Quality of Life through e-Services;54
5.1;From the Digital Divide to Digital Inequality: A Secondary Research in the European Union;55
5.1.1;Introduction;55
5.1.2;Determinant Factors of the Digital Divide;56
5.1.3;Forms of Digital Inequality;59
5.1.4;Methodological Approach;60
5.1.5;Findings;61
5.1.6;Conclusion;64
5.1.7;References;65
5.2;Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The“Green” Ultimate Solution for an Ever Improving Life Quality and Safety?;67
5.2.1;Introduction;67
5.2.2;Inkjet-Printed SW-CNT;68
5.2.3;RFID-Enabled “Green” Wireless Sensor Node Module;71
5.2.4;Conclusions;74
5.2.5;References;75
5.3;Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective;76
5.3.1;Introduction;76
5.3.2;Theoretical Framework;77
5.3.2.1;e-Procurement;77
5.3.2.2;Diffusion of Innovation;78
5.3.2.3;The Perceived Characteristics of Innovating;79
5.3.3;Research Design;80
5.3.3.1;Research Setting;80
5.3.3.2;Research Instrument;81
5.3.3.3;Sample and Data Collection;82
5.3.4;Results and Discussion;82
5.3.5;Concluding Remarks;85
5.3.6;References;85
6;Session 3 Politics – Legislation – Regulatory Framework II;88
6.1;Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems;89
6.1.1;Introduction;89
6.1.2;Positivism and Interpretivism;90
6.1.3;Analysis of e-Government Literature and Implications;91
6.1.4;Conclusions;93
6.1.5;References;94
7;Session 4 Supporting Democracy through e-Services;97
7.1;e-Campaigning: The Present and Future;98
7.1.1;Introduction;98
7.1.2;The McCain Campaign;99
7.1.3;The Obama Campaign;99
7.1.3.1;Obama on Facebook;100
7.1.3.2;Generation Obama;100
7.1.3.3;Obama Mobile;100
7.1.3.4;Obama on Twitter;101
7.1.3.5;Advertising in Video Games;101
7.1.4;Public Involvement;101
7.1.4.1;Vote Different;101
7.1.4.2;Obama Girl;101
7.1.5;The Future of e-Campaigning;102
7.1.6;World Internet Usage Statistics;102
7.1.7;Providing Web Accessibility for Everyone;102
7.1.8;e-Voting;103
7.1.9;Representative Interaction Websites;103
7.1.10;Web 2.0 Technologies;105
7.1.10.1;Web Feeds;105
7.1.10.2;Wikis;105
7.1.10.3;Mashups;106
7.1.10.4;Folksonomies;106
7.1.11;e-Campaigning and e-Democracy;106
7.1.12;Conclusion;107
7.1.13;References;107
7.2;e-Democracy: The Political Culture of Tomorrow’s Citizens;108
7.2.1;Introduction;108
7.2.1.1;Aim;109
7.2.2;Method;109
7.2.2.1;Data Collection;110
7.2.2.2;Data Analysis;110
7.2.3;Results;110
7.2.3.1;The Effect of Internet on Students and the Factors That Influence It;110
7.2.3.2;Students Opinions for e-Democracy;111
7.2.3.3;The Opinions of Students Opposed to Those of Their Teachers;113
7.2.4;Conclusions;115
7.2.5;References;115
7.3;Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network;117
7.3.1;Introduction;117
7.3.2;Electronic Voting;120
7.3.3;Parademo as a Large-Scale Decision Making System for Communities;121
7.3.3.1;Basic Concepts of Parademo;121
7.3.3.2;Roles;123
7.3.3.3;Groups;124
7.3.4;Algorithms;124
7.3.4.1;Algorithm to Calculate the Weight of Proposals;124
7.3.4.2;Algorithm for Automated Reputation Feedback;124
7.3.5;Listeners on Information Streams within Communities;125
7.3.6;Summary and Future Work;125
7.3.7;References;126
7.4;Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting;127
7.4.1;Introduction;127
7.4.2;Related Work;128
7.4.3;Model for eParticipation Application Design;128
7.4.4;Telep@b Project;130
7.4.4.1;Telep@b Portal;131
7.4.5;Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project;133
7.4.6;Conclusions;135
7.4.7;References;136
7.5;Stakeholder e-Participation in Local Planning: The Camargue Park Case;137
7.5.1;Introduction;137
7.5.2;Internet Potential for Participation in Local Planning;138
7.5.2.1;Public Participation in Local Planning;138
7.5.2.2;Internet Potential for Local Planning Participation;139
7.5.3;Context and Tools of Camargue e-Consultation;139
7.5.3.1;Institutional and Social Context of the Camargue e-Consultation;139
7.5.3.2;e-Tools for Costless and More Deliberative Planning Debate;140
7.5.4;Evaluation Design of the e-Consultation Features and Outcomes;141
7.5.4.1;Hypotheses;141
7.5.4.2;Evaluation Design;142
7.5.5;First Results;143
7.5.6;Conclusion;144
7.5.7;References;145
8;Session 5 Identity Management, Privacy and Trust;147
8.1;Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems;148
8.1.1;Introduction;148
8.1.2;Existing Implementations and Related Work;149
8.1.3;Federated Identity Management System;150
8.1.4;Privacy-Aware Mobile Framework;152
8.1.5;Usage Scenario of $SecIdAM$;154
8.1.6;Conclusions;156
8.1.7;References;156
8.2;Economics of Personal Data Management: Fair Personal Information Trades;158
8.2.1;Introduction;158
8.2.2;Fair Personal Information Trades;160
8.2.2.1;Concepts and Architecture;160
8.2.2.2;Personal Data Management in FPIT;161
8.2.2.3;FPIT-Users;161
8.2.2.4;Payments in FPIT;162
8.2.2.5;Trading Process in FPIT;163
8.2.3;The FPIT Prototype;165
8.2.4;Discussion;166
8.2.5;References;166
8.3;Evaluating Common Privacy Vulnerabilities in Internet Service Providers;168
8.3.1;Introduction;168
8.3.2;Privacy Related Critical Systems and Threats;169
8.3.2.1;Privacy-Specific Threats;170
8.3.3;Common Privacy Related Vulnerabilities and Possible Measures;171
8.3.3.1;User Account Management;171
8.3.3.2;Logging and Auditing;172
8.3.3.3;Contractors and Third Parties;173
8.3.3.4;Perimeter and Network Security;175
8.3.3.5;System and Network Maintenance;175
8.3.4;Conclusion;176
8.3.5;References;176
8.4;Intellectual Property Rights Protection in Peer to Peer Networks;178
8.4.1;Introduction;178
8.4.2;IPR Protection – Watermarking and Keys;179
8.4.2.1;Copyright Protection through Watermarking;179
8.4.2.2;Generating Keys with the Watermarking Algorithm;180
8.4.2.3;Watermarking Keys and the P2P Network;181
8.4.3;NBDT P2P Network;182
8.4.4;Conclusions;184
8.4.5;References;184
9;Session 6 Security, Attacks and Crime;186
9.1;Information Assurance and Forensic Readiness;187
9.1.1;Introduction;187
9.1.2;The Audit Process;188
9.1.3;Forensic Readiness and the Digital Forensics Process;190
9.1.4;Analysis and Discussion;191
9.1.4.1;The Security Auditor Needs to Revisit the Risk Analysis Paradigm;191
9.1.4.2;Redress;191
9.1.4.3;Business Continuity and Forensic Readiness;192
9.1.4.4;Well Established Roles in Forensics;192
9.1.4.5;Forensics on the Security Policies;192
9.1.5;Conclusions;193
9.1.6;References;193
9.2;An Ontology-Driven antiSPIT Architecture;195
9.2.1;Introduction;195
9.2.2;Spam over Internet Telephony (SPIT);196
9.2.3;A Proposed Anti-SPIT Architecture;197
9.2.3.1;Anti-SPIT Policies;197
9.2.3.2;The OntoSPIT Model;198
9.2.3.3;SPIT Management Architecture;198
9.2.4;Use of the Architecture;199
9.2.5;Architecture Evaluation;200
9.2.6;Conclusions and Further Research;203
9.2.7;References;203
9.3;Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?;205
9.3.1;Introduction;205
9.3.2;Random Graphs;207
9.3.3;First and Second Order Logic and Relationships;207
9.3.3.1;First Order Language of Graphs;207
9.3.3.2;Second Order Language of Graphs;208
9.3.4;Probability Theory – Undecidable Probabilities;210
9.3.5;The Self-referential Nature of Trust;212
9.3.6;Discussion;213
9.3.7;References;213
9.4;Biological Aspects of Computer Virology;215
9.4.1;Introduction;215
9.4.2;Related Work;216
9.4.3;Infection Propagator;217
9.4.3.1;Vulnerability Prevalence;217
9.4.3.2;Age of the Vulnerability at Time of Exploitation;218
9.4.3.3;Exploitation Difficulty;219
9.4.4;Target Locator;219
9.4.5;WormVirulence;219
9.4.6;Computer Epidemiology;220
9.4.7;Conclusion;222
9.4.8;References;223
9.5;Information Systems Security Management: A Review and a Classification of the ISO Standards;226
9.5.1;Introduction;226
9.5.2;Information Security Management Systems Standards;227
9.5.2.1;Concepts and Models for Information and Communications Technology (ICT) Security Management;227
9.5.2.2;Information Security Management Systems;227
9.5.2.3;Information Security Risk Management Standard;229
9.5.3;Information Security Management Specific Areas’ Standards;230
9.5.3.1;Network Security Management;230
9.5.3.2;Auditing;231
9.5.3.3;Trusted Third Parties (TTPs);231
9.5.3.4;Incident Management;231
9.5.3.5;Business Continuity;232
9.5.3.6;Non-repudiation;233
9.5.3.7;Digital Signatures;233
9.5.3.8;Access Control;233
9.5.3.9;Cryptographic Controls;234
9.5.3.10;Systems Security Engineering;235
9.5.3.11;Assurance and Evaluation;235
9.5.4;Classification of Information Security Management Standards;236
9.5.5;Limitations and Further Research;238
9.5.6;References;238
9.6;Web Server Security on Open Source Environments;242
9.6.1;Introduction;242
9.6.2;Facing Security Issues on the Front Line;243
9.6.2.1;File Permissions;244
9.6.2.2;Shielding Your Server with SSL;244
9.6.2.3;Logging Critical Information;246
9.6.2.4;Password Management and Backups;246
9.6.2.5;VPN Usage for Extra Security;248
9.6.3;Pioneering Security Mechanisms;249
9.6.3.1;Building Your Own Honey Pots;249
9.6.3.2;Password-Less Login Using RSA Keys;250
9.6.3.3;Port-Knocking;250
9.6.3.4;File System Encryption;251
9.6.4;Conclusions and Future Work;251
9.6.5;References;252
10;Session 7 e-Government and Local e-Government;254
10.1;e-Government Readiness, Strategy and Two Different User Groups - in Austria;255
10.1.1;Introduction;255
10.1.2;The Austrian e-Government Strategy;255
10.1.3;e-Government Readiness;256
10.1.4;Two Different e-Government User Groups in Austria;257
10.1.4.1;User Group 1: The Municipalities;257
10.1.4.2;User Group 2: Adolescent Citizens;258
10.1.5;Lessons Learned;260
10.1.6;References;261
10.2;On e-Government Project Development in Balmeda;263
10.2.1;Introduction;263
10.2.2;The Environment;265
10.2.3;The General Projects Office;266
10.2.4;The Main Story;267
10.2.4.1;Call for Tender Phase;267
10.2.4.2;Requirements Collection;268
10.2.4.3;Development;269
10.2.4.4;Testing;270
10.2.5;Analysis and Conclusions;271
10.2.6;References;273
10.3;A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States;274
10.3.1;Introduction;274
10.3.2;Overview;276
10.3.3;System Architecture;277
10.3.4;Message Structure and Signing;279
10.3.5;Conclusion;281
10.3.6;References;281
10.4;e-Government for Development Information Exchange (DIE): Zambia;283
10.4.1;Introduction;283
10.4.2;Literature Review;285
10.4.3;Zambia’s e-Government Environment: Challenges, Issues and Opportunities;288
10.4.4;e-Government Adoption Criteria;291
10.4.5;Conclusions;293
10.4.6;References;295
11;Session 8 Education and Training;297
11.1;Semantic e-Learning: Next Generation of e-Learning?;298
11.1.1;Introduction;298
11.1.2;Background;299
11.1.3;Semantic Web Technologies;301
11.1.3.1;XML;301
11.1.3.2;URIs;301
11.1.3.3;RDF and RDFS;301
11.1.3.4;Web Services and Semantic Web Services;302
11.1.3.5;Ontologies;302
11.1.3.6;Other Languages;303
11.1.3.7;Intelligent Agents;303
11.1.4;Semantic e-Learning Applications;303
11.1.4.1;Semantic Portals;304
11.1.4.2;Semantic Search;304
11.1.4.3;Personalization;304
11.1.4.4;Recommendation Systems;305
11.1.4.5;Web 2.0 and Social Software;305
11.1.5;Future Trends;306
11.1.6;Conclusion;307
11.1.7;References;308
11.2;Supporting Rural Citizens’ Access to Knowledge: One More Aspect of e-Democracy;312
11.2.1;‘Rural Learning’: A Vehicle to Development;312
11.2.2;The Role of New Technologies for Capacity Building in the Rural Space;313
11.2.3;Rural Schools: Challenges and Opportunities;313
11.2.3.1;Rural Schools and Community Development;313
11.2.3.2;Difficulties for Rural Schools and Teachers;314
11.2.3.3;Using Technologies for Rural Teachers’ Professional Development;315
11.2.4;Our Experience: Facilitating Rural Teachers to Respond to the New Challenges;315
11.2.4.1;Evaluation;316
11.2.5;A Proposed Framework for Rural Learning through Teacher Development;316
11.2.5.1;The Content of Teacher Development Programmes;317
11.2.5.2;The Delivery Channels and Methods;318
11.2.5.3;The Importance of Networking;319
11.2.5.4;Inspiring New Leadership Roles for Teachers;319
11.2.6;References;320
11.3;Evaluating a Greek National Action on Parents' Training on ICT and Internet Safety;323
11.3.1;Introduction;323
11.3.2;Goneis.gr Initiative;324
11.3.3;Evaluation of Users’ Satisfaction;326
11.3.4;Conclusions;330
11.3.5;References;331
11.4;Evaluating a Greek National Action on Students'Training on ICT and Programming Competences;332
11.4.1;Introduction;332
11.4.2;e-kpaidefteite.gr National Initiative;334
11.4.3;e-kpaidefteite.gr Web Portal;335
11.4.4;Evaluation of Users’ Satisfaction;336
11.4.4.1;Methodology;336
11.4.4.2;Beneficiaries’ Survey;336
11.4.4.3;Educational Providers’ Survey;339
11.4.5;Conclusions;340
12;Session 9 Collaboration, Social Networking, Blogs;342
12.1;OPSIS: An Open, Preventive and Scalable Migration Information System;343
12.1.1;Introduction;343
12.1.2;State of the Art;344
12.1.3;OPSIS Core Design Principles;345
12.1.4;OPSIS System Overview;347
12.1.4.1;OPSIS Content Management System;348
12.1.4.2;OPSIS Decision Support System;350
12.1.4.3;OPSIS Web-Portal;351
12.1.5;Conclusions-Future Research Directions;351
12.1.6;References;352
12.2;Online Communities: The Case of Immigrants in Greece;353
12.2.1;Introduction;353
12.2.2;The ANCE Approach to the Creation of an Online Community;354
12.2.3;Supporting Tools and Technologies;355
12.2.3.1;Classification Criteria for Groupware Tools;356
12.2.3.2;Tools and Technologies for Communities: What to Choose?;357
12.2.4;The Proposed Technical Approach;359
12.2.5;Conclusions and Future Work;360
12.2.6;References;361
12.3;From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities;362
12.3.1;Introduction;362
12.3.2;The Evolution of the Digital City;363
12.3.2.1;Virtual Cases;363
12.3.2.2;Physical Cases;364
12.3.3;Investigating the Performance of a Digital City;368
12.3.4;Conclusions;373
12.3.5;References;373
12.4;A New Paradigm for Secure Social Lending;375
12.4.1;Introduction;375
12.4.1.1;Evolution of e-Services;375
12.4.1.2;What Is Social Lending;376
12.4.1.3;Facts and Figures;376
12.4.2;Analysis of Social Lending;377
12.4.2.1;Social Lending Models;377
12.4.2.2;Case Studies;377
12.4.2.3;Issues;378
12.4.2.4;Specifications;381
12.4.3;Making Social Lending Safer;381
12.4.3.1;e-Services – The Next Generation;381
12.4.3.2;A New Paradigm;382
12.4.4;Conclusions;384
12.4.4.1;Benefits;385
12.4.4.2;Further Evolution and Improvements;385
12.4.4.3;Summary;386
12.4.5;References;387
12.5;Techno Generation: Social Networking amongst Youth in South Africa;388
12.5.1;Introduction;388
12.5.2;Research Methodology;391
12.5.3;Research Findings;392
12.5.3.1;The Internet;392
12.5.3.2;Social Networking Sites;393
12.5.3.3;Weblogs;396
12.5.4;Concluding Insights;396
12.5.5;Future Research;397
12.5.6;References;397
12.6;Combining Immersive Virtual Worlds and Virtual Learning Environments into an Integrated System forHosting and Supporting Virtual Conferences;399
12.6.1;Introduction;399
12.6.2;The Virtual Conference;400
12.6.2.1;Definitions and Features;400
12.6.2.2;History and Technology;400
12.6.3;Choosing Technology for Hosting and Supporting Virtual Conferences;401
12.6.3.1;Criteria and Modern Aspects about Technology Use for Conference Conduction;401
12.6.3.2;Technology Review;402
12.6.3.3;Assessing Previous Experience and Choosing Technology;403
12.6.4;Sloodle;403
12.6.4.1;Overview and Architecture;403
12.6.4.2;The Sloodle Project;403
12.6.4.3;Features;404
12.6.5;Developing a System for Hosting and Supporting a Virtual Conference Based on Sloodle Technology;405
12.6.5.1;The Core Concept;405
12.6.5.2;Implementation;405
12.6.6;Conclusions;407
12.6.7;References;408
13;Session 10 Pervasive, Ubiquitous, and Intelligent Computing;410
13.1;Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks;411
13.1.1;Introduction;411
13.1.2;Social Network Analysis;413
13.1.2.1;Centrality Metrics;413
13.1.3;Applications to Protocol Design;414
13.1.3.1;Topology Control;414
13.1.3.2;Cooperative Caching;414
13.1.3.3;Vehicular Networks;416
13.1.4;Related Work;419
13.1.5;Conclusions;420
13.1.6;References;420
13.2;SWEB: An Advanced Mobile Residence Certificate Service;421
13.2.1;Introduction;421
13.2.2;Requirements of the mRCertificate Service;422
13.2.3;Proposed m-Government Framework;423
13.2.3.1;Involved Entities;423
13.2.3.2;m-SWEB Platform Overview;424
13.2.4;Mobile Residence Certificate Processes;426
13.2.5;Conclusions and Future Work;429
13.2.6;References;429
13.3;p-Democracy a Pervasive Majority Rule;431
13.3.1;Introduction;431
13.3.2;Background and Current Trends;432
13.3.3;Everyware, a Pervasive Platform;433
13.3.4;Everyware Application: p-Democracy;433
13.3.5;Structure the Hierarchy into Interrelated Decision Elements;434
13.3.6;Collect Pair Wise Comparisons of the Decision Elements;435
13.3.7;Calculate the Relative Weights of the Decision Elements Using the Eigenvector and Check for Consistency;435
13.3.8;Aggregate the Relative Weights of the Decision Elements to Arrive at an Overall Individual Ranking;436
13.3.9;Aggregate the Overall Individual Rankings for Each Hierarchon to Obtain Group Ranking;437
13.3.10;The Scale Solution;437
13.3.11;Conclusions;439
13.3.12;References;439
13.4;Group Monitoring in Mobile Ad-Hoc Networks;441
13.4.1;Introduction;441
13.4.2;System Model;442
13.4.2.1;Overview;442
13.4.2.2;Privacy Related Requirements;442
13.4.2.3;Technical Requirements;443
13.4.3;System Design;445
13.4.3.1;No Node Identifiers;445
13.4.3.2;No Point-to-Point Routing;446
13.4.3.3;Gossip-Based Message Propagation;446
13.4.4;Anonymous Communications;447
13.4.4.1;Discussion;448
13.4.5;Related Work;449
13.4.6;Conclusions and Future Work;450
13.4.7;References;450
14;Author Index;452




