Sideridis / Patrikakis Next Generation Society Technological and Legal Issues

Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers
2010
ISBN: 978-3-642-11631-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers

E-Book, Englisch, Band 26, 454 Seiten

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-642-11631-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece, in September 2009.

The 40 revised full papers presented were carefully reviewed. The papers are organized in topical sections on politics - legislation - regulatory framework I, enhancing quality of life through e-services, politics - legislation - regulatory framework II supporting democracy through e-services, identity management, privacy and trust, securitiy, attacks and crime, e-government & local e-government, education and training, collaboration, social networking, blogs, pervasive, ubiquitous, and intelligent computing.

Sideridis / Patrikakis Next Generation Society Technological and Legal Issues jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Organization;7
3;Table of Contents;11
4;Session 1 Politics – Legislation – Regulatory Framework I;15
4.1;A Study on the Lack of Enforcement of Data Protection Acts;16
4.1.1;Introduction;16
4.1.2;Background;17
4.1.2.1;Related Work;17
4.1.2.2;Legal Background;17
4.1.3;Study Setup;18
4.1.4;Study Results;19
4.1.4.1;The Privacy Policy;19
4.1.4.2;Request for Consent;23
4.1.4.3;Request for Information;23
4.1.4.4;The Right of Deletion;24
4.1.5;Conclusions;25
4.1.6;References;25
4.2;The Impact of the Web and Political Balance to e-Democracy;26
4.2.1;Introduction;26
4.2.2;Web, State and Political Movements;28
4.2.2.1;Web and the Democratic Deficit Condition;28
4.2.2.2;Web and Collective Action;30
4.2.3;The Limits of Democracy;32
4.2.4;Crisis or Reinforcement of Balance;34
4.2.5;New Forms of Political Balance;35
4.2.6;Conclusions;39
4.2.7;References;40
4.3;Using Structured e-Forum to Support the Legislation Formation Process;42
4.3.1;Introduction;42
4.3.2;Background;43
4.3.3;Research Methodology;44
4.3.4;The Austrian Parliament Pilot;45
4.3.5;The Greek Parliament Pilot;49
4.3.6;Conclusions;51
4.3.7;References;52
5;Session 2 Enhancing Quality of Life through e-Services;54
5.1;From the Digital Divide to Digital Inequality: A Secondary Research in the European Union;55
5.1.1;Introduction;55
5.1.2;Determinant Factors of the Digital Divide;56
5.1.3;Forms of Digital Inequality;59
5.1.4;Methodological Approach;60
5.1.5;Findings;61
5.1.6;Conclusion;64
5.1.7;References;65
5.2;Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The“Green” Ultimate Solution for an Ever Improving Life Quality and Safety?;67
5.2.1;Introduction;67
5.2.2;Inkjet-Printed SW-CNT;68
5.2.3;RFID-Enabled “Green” Wireless Sensor Node Module;71
5.2.4;Conclusions;74
5.2.5;References;75
5.3;Examining Adoption of e-Procurement in Public Sector Using the Perceived Characteristics of Innovating: Indonesian Perspective;76
5.3.1;Introduction;76
5.3.2;Theoretical Framework;77
5.3.2.1;e-Procurement;77
5.3.2.2;Diffusion of Innovation;78
5.3.2.3;The Perceived Characteristics of Innovating;79
5.3.3;Research Design;80
5.3.3.1;Research Setting;80
5.3.3.2;Research Instrument;81
5.3.3.3;Sample and Data Collection;82
5.3.4;Results and Discussion;82
5.3.5;Concluding Remarks;85
5.3.6;References;85
6;Session 3 Politics – Legislation – Regulatory Framework II;88
6.1;Studying the Interaction of the Epistemology in e-Government, Organization Studies and Information Systems;89
6.1.1;Introduction;89
6.1.2;Positivism and Interpretivism;90
6.1.3;Analysis of e-Government Literature and Implications;91
6.1.4;Conclusions;93
6.1.5;References;94
7;Session 4 Supporting Democracy through e-Services;97
7.1;e-Campaigning: The Present and Future;98
7.1.1;Introduction;98
7.1.2;The McCain Campaign;99
7.1.3;The Obama Campaign;99
7.1.3.1;Obama on Facebook;100
7.1.3.2;Generation Obama;100
7.1.3.3;Obama Mobile;100
7.1.3.4;Obama on Twitter;101
7.1.3.5;Advertising in Video Games;101
7.1.4;Public Involvement;101
7.1.4.1;Vote Different;101
7.1.4.2;Obama Girl;101
7.1.5;The Future of e-Campaigning;102
7.1.6;World Internet Usage Statistics;102
7.1.7;Providing Web Accessibility for Everyone;102
7.1.8;e-Voting;103
7.1.9;Representative Interaction Websites;103
7.1.10;Web 2.0 Technologies;105
7.1.10.1;Web Feeds;105
7.1.10.2;Wikis;105
7.1.10.3;Mashups;106
7.1.10.4;Folksonomies;106
7.1.11;e-Campaigning and e-Democracy;106
7.1.12;Conclusion;107
7.1.13;References;107
7.2;e-Democracy: The Political Culture of Tomorrow’s Citizens;108
7.2.1;Introduction;108
7.2.1.1;Aim;109
7.2.2;Method;109
7.2.2.1;Data Collection;110
7.2.2.2;Data Analysis;110
7.2.3;Results;110
7.2.3.1;The Effect of Internet on Students and the Factors That Influence It;110
7.2.3.2;Students Opinions for e-Democracy;111
7.2.3.3;The Opinions of Students Opposed to Those of Their Teachers;113
7.2.4;Conclusions;115
7.2.5;References;115
7.3;Parademo: e-Democracy Based on a Delegated Expert Selection Process in a Small-World Network;117
7.3.1;Introduction;117
7.3.2;Electronic Voting;120
7.3.3;Parademo as a Large-Scale Decision Making System for Communities;121
7.3.3.1;Basic Concepts of Parademo;121
7.3.3.2;Roles;123
7.3.3.3;Groups;124
7.3.4;Algorithms;124
7.3.4.1;Algorithm to Calculate the Weight of Proposals;124
7.3.4.2;Algorithm for Automated Reputation Feedback;124
7.3.5;Listeners on Information Streams within Communities;125
7.3.6;Summary and Future Work;125
7.3.7;References;126
7.4;Telep@b Project: Towards a Model for eParticipation and a Case Study in Participatory Budgeting;127
7.4.1;Introduction;127
7.4.2;Related Work;128
7.4.3;Model for eParticipation Application Design;128
7.4.4;Telep@b Project;130
7.4.4.1;Telep@b Portal;131
7.4.5;Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project;133
7.4.6;Conclusions;135
7.4.7;References;136
7.5;Stakeholder e-Participation in Local Planning: The Camargue Park Case;137
7.5.1;Introduction;137
7.5.2;Internet Potential for Participation in Local Planning;138
7.5.2.1;Public Participation in Local Planning;138
7.5.2.2;Internet Potential for Local Planning Participation;139
7.5.3;Context and Tools of Camargue e-Consultation;139
7.5.3.1;Institutional and Social Context of the Camargue e-Consultation;139
7.5.3.2;e-Tools for Costless and More Deliberative Planning Debate;140
7.5.4;Evaluation Design of the e-Consultation Features and Outcomes;141
7.5.4.1;Hypotheses;141
7.5.4.2;Evaluation Design;142
7.5.5;First Results;143
7.5.6;Conclusion;144
7.5.7;References;145
8;Session 5 Identity Management, Privacy and Trust;147
8.1;Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems;148
8.1.1;Introduction;148
8.1.2;Existing Implementations and Related Work;149
8.1.3;Federated Identity Management System;150
8.1.4;Privacy-Aware Mobile Framework;152
8.1.5;Usage Scenario of $SecIdAM$;154
8.1.6;Conclusions;156
8.1.7;References;156
8.2;Economics of Personal Data Management: Fair Personal Information Trades;158
8.2.1;Introduction;158
8.2.2;Fair Personal Information Trades;160
8.2.2.1;Concepts and Architecture;160
8.2.2.2;Personal Data Management in FPIT;161
8.2.2.3;FPIT-Users;161
8.2.2.4;Payments in FPIT;162
8.2.2.5;Trading Process in FPIT;163
8.2.3;The FPIT Prototype;165
8.2.4;Discussion;166
8.2.5;References;166
8.3;Evaluating Common Privacy Vulnerabilities in Internet Service Providers;168
8.3.1;Introduction;168
8.3.2;Privacy Related Critical Systems and Threats;169
8.3.2.1;Privacy-Specific Threats;170
8.3.3;Common Privacy Related Vulnerabilities and Possible Measures;171
8.3.3.1;User Account Management;171
8.3.3.2;Logging and Auditing;172
8.3.3.3;Contractors and Third Parties;173
8.3.3.4;Perimeter and Network Security;175
8.3.3.5;System and Network Maintenance;175
8.3.4;Conclusion;176
8.3.5;References;176
8.4;Intellectual Property Rights Protection in Peer to Peer Networks;178
8.4.1;Introduction;178
8.4.2;IPR Protection – Watermarking and Keys;179
8.4.2.1;Copyright Protection through Watermarking;179
8.4.2.2;Generating Keys with the Watermarking Algorithm;180
8.4.2.3;Watermarking Keys and the P2P Network;181
8.4.3;NBDT P2P Network;182
8.4.4;Conclusions;184
8.4.5;References;184
9;Session 6 Security, Attacks and Crime;186
9.1;Information Assurance and Forensic Readiness;187
9.1.1;Introduction;187
9.1.2;The Audit Process;188
9.1.3;Forensic Readiness and the Digital Forensics Process;190
9.1.4;Analysis and Discussion;191
9.1.4.1;The Security Auditor Needs to Revisit the Risk Analysis Paradigm;191
9.1.4.2;Redress;191
9.1.4.3;Business Continuity and Forensic Readiness;192
9.1.4.4;Well Established Roles in Forensics;192
9.1.4.5;Forensics on the Security Policies;192
9.1.5;Conclusions;193
9.1.6;References;193
9.2;An Ontology-Driven antiSPIT Architecture;195
9.2.1;Introduction;195
9.2.2;Spam over Internet Telephony (SPIT);196
9.2.3;A Proposed Anti-SPIT Architecture;197
9.2.3.1;Anti-SPIT Policies;197
9.2.3.2;The OntoSPIT Model;198
9.2.3.3;SPIT Management Architecture;198
9.2.4;Use of the Architecture;199
9.2.5;Architecture Evaluation;200
9.2.6;Conclusions and Further Research;203
9.2.7;References;203
9.3;Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?;205
9.3.1;Introduction;205
9.3.2;Random Graphs;207
9.3.3;First and Second Order Logic and Relationships;207
9.3.3.1;First Order Language of Graphs;207
9.3.3.2;Second Order Language of Graphs;208
9.3.4;Probability Theory – Undecidable Probabilities;210
9.3.5;The Self-referential Nature of Trust;212
9.3.6;Discussion;213
9.3.7;References;213
9.4;Biological Aspects of Computer Virology;215
9.4.1;Introduction;215
9.4.2;Related Work;216
9.4.3;Infection Propagator;217
9.4.3.1;Vulnerability Prevalence;217
9.4.3.2;Age of the Vulnerability at Time of Exploitation;218
9.4.3.3;Exploitation Difficulty;219
9.4.4;Target Locator;219
9.4.5;WormVirulence;219
9.4.6;Computer Epidemiology;220
9.4.7;Conclusion;222
9.4.8;References;223
9.5;Information Systems Security Management: A Review and a Classification of the ISO Standards;226
9.5.1;Introduction;226
9.5.2;Information Security Management Systems Standards;227
9.5.2.1;Concepts and Models for Information and Communications Technology (ICT) Security Management;227
9.5.2.2;Information Security Management Systems;227
9.5.2.3;Information Security Risk Management Standard;229
9.5.3;Information Security Management Specific Areas’ Standards;230
9.5.3.1;Network Security Management;230
9.5.3.2;Auditing;231
9.5.3.3;Trusted Third Parties (TTPs);231
9.5.3.4;Incident Management;231
9.5.3.5;Business Continuity;232
9.5.3.6;Non-repudiation;233
9.5.3.7;Digital Signatures;233
9.5.3.8;Access Control;233
9.5.3.9;Cryptographic Controls;234
9.5.3.10;Systems Security Engineering;235
9.5.3.11;Assurance and Evaluation;235
9.5.4;Classification of Information Security Management Standards;236
9.5.5;Limitations and Further Research;238
9.5.6;References;238
9.6;Web Server Security on Open Source Environments;242
9.6.1;Introduction;242
9.6.2;Facing Security Issues on the Front Line;243
9.6.2.1;File Permissions;244
9.6.2.2;Shielding Your Server with SSL;244
9.6.2.3;Logging Critical Information;246
9.6.2.4;Password Management and Backups;246
9.6.2.5;VPN Usage for Extra Security;248
9.6.3;Pioneering Security Mechanisms;249
9.6.3.1;Building Your Own Honey Pots;249
9.6.3.2;Password-Less Login Using RSA Keys;250
9.6.3.3;Port-Knocking;250
9.6.3.4;File System Encryption;251
9.6.4;Conclusions and Future Work;251
9.6.5;References;252
10;Session 7 e-Government and Local e-Government;254
10.1;e-Government Readiness, Strategy and Two Different User Groups - in Austria;255
10.1.1;Introduction;255
10.1.2;The Austrian e-Government Strategy;255
10.1.3;e-Government Readiness;256
10.1.4;Two Different e-Government User Groups in Austria;257
10.1.4.1;User Group 1: The Municipalities;257
10.1.4.2;User Group 2: Adolescent Citizens;258
10.1.5;Lessons Learned;260
10.1.6;References;261
10.2;On e-Government Project Development in Balmeda;263
10.2.1;Introduction;263
10.2.2;The Environment;265
10.2.3;The General Projects Office;266
10.2.4;The Main Story;267
10.2.4.1;Call for Tender Phase;267
10.2.4.2;Requirements Collection;268
10.2.4.3;Development;269
10.2.4.4;Testing;270
10.2.5;Analysis and Conclusions;271
10.2.6;References;273
10.3;A Prototype System for Electronic Data Interchange among Registrar's Offices of Different States;274
10.3.1;Introduction;274
10.3.2;Overview;276
10.3.3;System Architecture;277
10.3.4;Message Structure and Signing;279
10.3.5;Conclusion;281
10.3.6;References;281
10.4;e-Government for Development Information Exchange (DIE): Zambia;283
10.4.1;Introduction;283
10.4.2;Literature Review;285
10.4.3;Zambia’s e-Government Environment: Challenges, Issues and Opportunities;288
10.4.4;e-Government Adoption Criteria;291
10.4.5;Conclusions;293
10.4.6;References;295
11;Session 8 Education and Training;297
11.1;Semantic e-Learning: Next Generation of e-Learning?;298
11.1.1;Introduction;298
11.1.2;Background;299
11.1.3;Semantic Web Technologies;301
11.1.3.1;XML;301
11.1.3.2;URIs;301
11.1.3.3;RDF and RDFS;301
11.1.3.4;Web Services and Semantic Web Services;302
11.1.3.5;Ontologies;302
11.1.3.6;Other Languages;303
11.1.3.7;Intelligent Agents;303
11.1.4;Semantic e-Learning Applications;303
11.1.4.1;Semantic Portals;304
11.1.4.2;Semantic Search;304
11.1.4.3;Personalization;304
11.1.4.4;Recommendation Systems;305
11.1.4.5;Web 2.0 and Social Software;305
11.1.5;Future Trends;306
11.1.6;Conclusion;307
11.1.7;References;308
11.2;Supporting Rural Citizens’ Access to Knowledge: One More Aspect of e-Democracy;312
11.2.1;‘Rural Learning’: A Vehicle to Development;312
11.2.2;The Role of New Technologies for Capacity Building in the Rural Space;313
11.2.3;Rural Schools: Challenges and Opportunities;313
11.2.3.1;Rural Schools and Community Development;313
11.2.3.2;Difficulties for Rural Schools and Teachers;314
11.2.3.3;Using Technologies for Rural Teachers’ Professional Development;315
11.2.4;Our Experience: Facilitating Rural Teachers to Respond to the New Challenges;315
11.2.4.1;Evaluation;316
11.2.5;A Proposed Framework for Rural Learning through Teacher Development;316
11.2.5.1;The Content of Teacher Development Programmes;317
11.2.5.2;The Delivery Channels and Methods;318
11.2.5.3;The Importance of Networking;319
11.2.5.4;Inspiring New Leadership Roles for Teachers;319
11.2.6;References;320
11.3;Evaluating a Greek National Action on Parents' Training on ICT and Internet Safety;323
11.3.1;Introduction;323
11.3.2;Goneis.gr Initiative;324
11.3.3;Evaluation of Users’ Satisfaction;326
11.3.4;Conclusions;330
11.3.5;References;331
11.4;Evaluating a Greek National Action on Students'Training on ICT and Programming Competences;332
11.4.1;Introduction;332
11.4.2;e-kpaidefteite.gr National Initiative;334
11.4.3;e-kpaidefteite.gr Web Portal;335
11.4.4;Evaluation of Users’ Satisfaction;336
11.4.4.1;Methodology;336
11.4.4.2;Beneficiaries’ Survey;336
11.4.4.3;Educational Providers’ Survey;339
11.4.5;Conclusions;340
12;Session 9 Collaboration, Social Networking, Blogs;342
12.1;OPSIS: An Open, Preventive and Scalable Migration Information System;343
12.1.1;Introduction;343
12.1.2;State of the Art;344
12.1.3;OPSIS Core Design Principles;345
12.1.4;OPSIS System Overview;347
12.1.4.1;OPSIS Content Management System;348
12.1.4.2;OPSIS Decision Support System;350
12.1.4.3;OPSIS Web-Portal;351
12.1.5;Conclusions-Future Research Directions;351
12.1.6;References;352
12.2;Online Communities: The Case of Immigrants in Greece;353
12.2.1;Introduction;353
12.2.2;The ANCE Approach to the Creation of an Online Community;354
12.2.3;Supporting Tools and Technologies;355
12.2.3.1;Classification Criteria for Groupware Tools;356
12.2.3.2;Tools and Technologies for Communities: What to Choose?;357
12.2.4;The Proposed Technical Approach;359
12.2.5;Conclusions and Future Work;360
12.2.6;References;361
12.3;From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities;362
12.3.1;Introduction;362
12.3.2;The Evolution of the Digital City;363
12.3.2.1;Virtual Cases;363
12.3.2.2;Physical Cases;364
12.3.3;Investigating the Performance of a Digital City;368
12.3.4;Conclusions;373
12.3.5;References;373
12.4;A New Paradigm for Secure Social Lending;375
12.4.1;Introduction;375
12.4.1.1;Evolution of e-Services;375
12.4.1.2;What Is Social Lending;376
12.4.1.3;Facts and Figures;376
12.4.2;Analysis of Social Lending;377
12.4.2.1;Social Lending Models;377
12.4.2.2;Case Studies;377
12.4.2.3;Issues;378
12.4.2.4;Specifications;381
12.4.3;Making Social Lending Safer;381
12.4.3.1;e-Services – The Next Generation;381
12.4.3.2;A New Paradigm;382
12.4.4;Conclusions;384
12.4.4.1;Benefits;385
12.4.4.2;Further Evolution and Improvements;385
12.4.4.3;Summary;386
12.4.5;References;387
12.5;Techno Generation: Social Networking amongst Youth in South Africa;388
12.5.1;Introduction;388
12.5.2;Research Methodology;391
12.5.3;Research Findings;392
12.5.3.1;The Internet;392
12.5.3.2;Social Networking Sites;393
12.5.3.3;Weblogs;396
12.5.4;Concluding Insights;396
12.5.5;Future Research;397
12.5.6;References;397
12.6;Combining Immersive Virtual Worlds and Virtual Learning Environments into an Integrated System forHosting and Supporting Virtual Conferences;399
12.6.1;Introduction;399
12.6.2;The Virtual Conference;400
12.6.2.1;Definitions and Features;400
12.6.2.2;History and Technology;400
12.6.3;Choosing Technology for Hosting and Supporting Virtual Conferences;401
12.6.3.1;Criteria and Modern Aspects about Technology Use for Conference Conduction;401
12.6.3.2;Technology Review;402
12.6.3.3;Assessing Previous Experience and Choosing Technology;403
12.6.4;Sloodle;403
12.6.4.1;Overview and Architecture;403
12.6.4.2;The Sloodle Project;403
12.6.4.3;Features;404
12.6.5;Developing a System for Hosting and Supporting a Virtual Conference Based on Sloodle Technology;405
12.6.5.1;The Core Concept;405
12.6.5.2;Implementation;405
12.6.6;Conclusions;407
12.6.7;References;408
13;Session 10 Pervasive, Ubiquitous, and Intelligent Computing;410
13.1;Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks;411
13.1.1;Introduction;411
13.1.2;Social Network Analysis;413
13.1.2.1;Centrality Metrics;413
13.1.3;Applications to Protocol Design;414
13.1.3.1;Topology Control;414
13.1.3.2;Cooperative Caching;414
13.1.3.3;Vehicular Networks;416
13.1.4;Related Work;419
13.1.5;Conclusions;420
13.1.6;References;420
13.2;SWEB: An Advanced Mobile Residence Certificate Service;421
13.2.1;Introduction;421
13.2.2;Requirements of the mRCertificate Service;422
13.2.3;Proposed m-Government Framework;423
13.2.3.1;Involved Entities;423
13.2.3.2;m-SWEB Platform Overview;424
13.2.4;Mobile Residence Certificate Processes;426
13.2.5;Conclusions and Future Work;429
13.2.6;References;429
13.3;p-Democracy a Pervasive Majority Rule;431
13.3.1;Introduction;431
13.3.2;Background and Current Trends;432
13.3.3;Everyware, a Pervasive Platform;433
13.3.4;Everyware Application: p-Democracy;433
13.3.5;Structure the Hierarchy into Interrelated Decision Elements;434
13.3.6;Collect Pair Wise Comparisons of the Decision Elements;435
13.3.7;Calculate the Relative Weights of the Decision Elements Using the Eigenvector and Check for Consistency;435
13.3.8;Aggregate the Relative Weights of the Decision Elements to Arrive at an Overall Individual Ranking;436
13.3.9;Aggregate the Overall Individual Rankings for Each Hierarchon to Obtain Group Ranking;437
13.3.10;The Scale Solution;437
13.3.11;Conclusions;439
13.3.12;References;439
13.4;Group Monitoring in Mobile Ad-Hoc Networks;441
13.4.1;Introduction;441
13.4.2;System Model;442
13.4.2.1;Overview;442
13.4.2.2;Privacy Related Requirements;442
13.4.2.3;Technical Requirements;443
13.4.3;System Design;445
13.4.3.1;No Node Identifiers;445
13.4.3.2;No Point-to-Point Routing;446
13.4.3.3;Gossip-Based Message Propagation;446
13.4.4;Anonymous Communications;447
13.4.4.1;Discussion;448
13.4.5;Related Work;449
13.4.6;Conclusions and Future Work;450
13.4.7;References;450
14;Author Index;452



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.