This book constitutes the refereed proceedings of the Third International ICST Conference, e-Democracy 2009, held in Athens, Greece. It covers numerous topics related to politics, legislation, regulatory framework and e-services.
Author(s): Alexander B. Sideridis, Charalampos Z. Patrikakis
Edition: 1st Edition.
Year: 2010
Language: English
Pages: 454
3642116299......Page 1
Lecture Notes of the Institute
for Computer Sciences, Social-Informatics
and Telecommunications Engineering 26......Page 2
Next Generation Society......Page 3
Preface......Page 5
Table of Contents......Page 11
Session 1 Politics – Legislation – Regulatory Framework I......Page 15
Introduction......Page 16
Legal Background......Page 17
Study Setup......Page 18
The Privacy Policy......Page 19
Request for Information......Page 23
The Right of Deletion......Page 24
References......Page 25
Introduction......Page 26
Web and the Democratic Deficit Condition......Page 28
Web and Collective Action......Page 30
The Limits of Democracy......Page 32
Crisis or Reinforcement of Balance......Page 34
New Forms of Political Balance......Page 35
Conclusions......Page 39
References......Page 40
Introduction......Page 42
Background......Page 43
Research Methodology......Page 44
The Austrian Parliament Pilot......Page 45
The Greek Parliament Pilot......Page 49
Conclusions......Page 51
References......Page 52
Session 2 Enhancing Quality of Life through e-Services......Page 54
Introduction......Page 55
Determinant Factors of the Digital Divide......Page 56
Forms of Digital Inequality......Page 59
Methodological Approach......Page 60
Findings......Page 61
Conclusion......Page 64
References......Page 65
Introduction......Page 67
Inkjet-Printed SW-CNT......Page 68
RFID-Enabled “Green” Wireless Sensor Node Module......Page 71
Conclusions......Page 74
References......Page 75
Introduction......Page 76
e-Procurement......Page 77
Diffusion of Innovation......Page 78
The Perceived Characteristics of Innovating......Page 79
Research Setting......Page 80
Research Instrument......Page 81
Results and Discussion......Page 82
References......Page 85
Session 3 Politics – Legislation – Regulatory Framework II......Page 88
Introduction......Page 89
Positivism and Interpretivism......Page 90
Analysis of e-Government Literature and Implications......Page 91
Conclusions......Page 93
References......Page 94
Session 4 Supporting Democracy through e-Services......Page 97
Introduction......Page 98
The Obama Campaign......Page 99
Obama Mobile......Page 100
Obama Girl......Page 101
Providing Web Accessibility for Everyone......Page 102
Representative Interaction Websites......Page 103
Wikis......Page 105
e-Campaigning and e-Democracy......Page 106
References......Page 107
Introduction......Page 108
Method......Page 109
The Effect of Internet on Students and the Factors That Influence It......Page 110
Students Opinions for e-Democracy......Page 111
The Opinions of Students Opposed to Those of Their Teachers......Page 113
References......Page 115
Introduction......Page 117
Electronic Voting......Page 120
Basic Concepts of Parademo......Page 121
Roles......Page 123
Algorithm for Automated Reputation Feedback......Page 124
Summary and Future Work......Page 125
References......Page 126
Introduction......Page 127
Model for eParticipation Application Design......Page 128
Telep@b Project......Page 130
Telep@b Portal......Page 131
Experimentation Activities in Telep@b and Future Activities in the PAAS-Telep@b Project......Page 133
Conclusions......Page 135
References......Page 136
Introduction......Page 137
Public Participation in Local Planning......Page 138
Institutional and Social Context of the Camargue e-Consultation......Page 139
e-Tools for Costless and More Deliberative Planning Debate......Page 140
Hypotheses......Page 141
Evaluation Design......Page 142
First Results......Page 143
Conclusion......Page 144
References......Page 145
Session 5 Identity Management, Privacy and Trust......Page 147
Introduction......Page 148
Existing Implementations and Related Work......Page 149
Federated Identity Management System......Page 150
Privacy-Aware Mobile Framework......Page 152
Usage Scenario of $SecIdAM$......Page 154
References......Page 156
Introduction......Page 158
Concepts and Architecture......Page 160
FPIT-Users......Page 161
Payments in FPIT......Page 162
Trading Process in FPIT......Page 163
The FPIT Prototype......Page 165
References......Page 166
Introduction......Page 168
Privacy Related Critical Systems and Threats......Page 169
Privacy-Specific Threats......Page 170
User Account Management......Page 171
Logging and Auditing......Page 172
Contractors and Third Parties......Page 173
System and Network Maintenance......Page 175
References......Page 176
Introduction......Page 178
Copyright Protection through Watermarking......Page 179
Generating Keys with the Watermarking Algorithm......Page 180
Watermarking Keys and the P2P Network......Page 181
NBDT P2P Network......Page 182
References......Page 184
Session 6 Security, Attacks and Crime......Page 186
Introduction......Page 187
The Audit Process......Page 188
Forensic Readiness and the Digital Forensics Process......Page 190
Redress......Page 191
Forensics on the Security Policies......Page 192
References......Page 193
Introduction......Page 195
Spam over Internet Telephony (SPIT)......Page 196
Anti-SPIT Policies......Page 197
SPIT Management Architecture......Page 198
Use of the Architecture......Page 199
Architecture Evaluation......Page 200
References......Page 203
Introduction......Page 205
First Order Language of Graphs......Page 207
Second Order Language of Graphs......Page 208
Probability Theory – Undecidable Probabilities......Page 210
The Self-referential Nature of Trust......Page 212
References......Page 213
Introduction......Page 215
Related Work......Page 216
Vulnerability Prevalence......Page 217
Age of the Vulnerability at Time of Exploitation......Page 218
Worm Virulence......Page 219
Computer Epidemiology......Page 220
Conclusion......Page 222
References......Page 223
Introduction......Page 226
Information Security Management Systems......Page 227
Information Security Risk Management Standard......Page 229
Network Security Management......Page 230
Incident Management......Page 231
Business Continuity......Page 232
Access Control......Page 233
Cryptographic Controls......Page 234
Assurance and Evaluation......Page 235
Classification of Information Security Management Standards......Page 236
References......Page 238
Introduction......Page 242
Facing Security Issues on the Front Line......Page 243
Shielding Your Server with SSL......Page 244
Password Management and Backups......Page 246
VPN Usage for Extra Security......Page 248
Building Your Own Honey Pots......Page 249
Port-Knocking......Page 250
Conclusions and Future Work......Page 251
References......Page 252
Session 7 e-Government and Local e-Government......Page 254
The Austrian e-Government Strategy......Page 255
e-Government Readiness......Page 256
User Group 1: The Municipalities......Page 257
User Group 2: Adolescent Citizens......Page 258
Lessons Learned......Page 260
References......Page 261
Introduction......Page 263
The Environment......Page 265
The General Projects Office......Page 266
Call for Tender Phase......Page 267
Requirements Collection......Page 268
Development......Page 269
Testing......Page 270
Analysis and Conclusions......Page 271
References......Page 273
Introduction......Page 274
Overview......Page 276
System Architecture......Page 277
Message Structure and Signing......Page 279
References......Page 281
Introduction......Page 283
Literature Review......Page 285
Zambia’s e-Government Environment: Challenges, Issues and Opportunities......Page 288
e-Government Adoption Criteria......Page 291
Conclusions......Page 293
References......Page 295
Session 8 Education and Training......Page 297
Introduction......Page 298
Background......Page 299
RDF and RDFS......Page 301
Ontologies......Page 302
Semantic e-Learning Applications......Page 303
Personalization......Page 304
Web 2.0 and Social Software......Page 305
Future Trends......Page 306
Conclusion......Page 307
References......Page 308
‘Rural Learning’: A Vehicle to Development......Page 312
Rural Schools and Community Development......Page 313
Difficulties for Rural Schools and Teachers......Page 314
Our Experience: Facilitating Rural Teachers to Respond to the New Challenges......Page 315
A Proposed Framework for Rural Learning through Teacher Development......Page 316
The Content of Teacher Development Programmes......Page 317
The Delivery Channels and Methods......Page 318
Inspiring New Leadership Roles for Teachers......Page 319
References......Page 320
Introduction......Page 323
Goneis.gr Initiative......Page 324
Evaluation of Users’ Satisfaction......Page 326
Conclusions......Page 330
References......Page 331
Introduction......Page 332
e-kpaidefteite.gr National Initiative......Page 334
e-kpaidefteite.gr Web Portal......Page 335
Beneficiaries’ Survey......Page 336
Educational Providers’ Survey......Page 339
References......Page 340
Session 9 Collaboration, Social Networking, Blogs......Page 342
Introduction......Page 343
State of the Art......Page 344
OPSIS Core Design Principles......Page 345
OPSIS System Overview......Page 347
OPSIS Content Management System......Page 348
OPSIS Decision Support System......Page 350
Conclusions-Future Research Directions......Page 351
References......Page 352
Introduction......Page 353
The ANCE Approach to the Creation of an Online Community......Page 354
Supporting Tools and Technologies......Page 355
Classification Criteria for Groupware Tools......Page 356
Tools and Technologies for Communities: What to Choose?......Page 357
The Proposed Technical Approach......Page 359
Conclusions and Future Work......Page 360
References......Page 361
Introduction......Page 362
Virtual Cases......Page 363
Physical Cases......Page 364
Investigating the Performance of a Digital City......Page 368
References......Page 373
Evolution of e-Services......Page 375
Facts and Figures......Page 376
Case Studies......Page 377
Issues......Page 378
e-Services – The Next Generation......Page 381
A New Paradigm......Page 382
Conclusions......Page 384
Further Evolution and Improvements......Page 385
Summary......Page 386
References......Page 387
Introduction......Page 388
Research Methodology......Page 391
The Internet......Page 392
Social Networking Sites......Page 393
Concluding Insights......Page 396
References......Page 397
Introduction......Page 399
History and Technology......Page 400
Criteria and Modern Aspects about Technology Use for Conference Conduction......Page 401
Technology Review......Page 402
The Sloodle Project......Page 403
Features......Page 404
Implementation......Page 405
Conclusions......Page 407
References......Page 408
Session 10 Pervasive, Ubiquitous, and Intelligent Computing......Page 410
Introduction......Page 411
Centrality Metrics......Page 413
Cooperative Caching......Page 414
Vehicular Networks......Page 416
Related Work......Page 419
References......Page 420
Introduction......Page 421
Requirements of the mRCertificate Service......Page 422
Involved Entities......Page 423
m-SWEB Platform Overview......Page 424
Mobile Residence Certificate Processes......Page 426
References......Page 429
Introduction......Page 431
Background and Current Trends......Page 432
Everyware Application: p-Democracy......Page 433
Collect Pair Wise Comparisons of the Decision Elements......Page 434
Calculate the Relative Weights of the Decision Elements Using the Eigenvector and Check for Consistency......Page 435
Aggregate the Relative Weights of the Decision Elements to Arrive at an Overall Individual Ranking......Page 436
Aggregate the Overall Individual Rankings for Each Hierarchon to Obtain Group Ranking......Page 437
References......Page 439
Introduction......Page 441
Privacy Related Requirements......Page 442
Technical Requirements......Page 443
No Node Identifiers......Page 445
Gossip-Based Message Propagation......Page 446
Anonymous Communications......Page 447
Discussion......Page 448
Related Work......Page 449
References......Page 450
Author Index......Page 452