Table of Contents
|
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience Jacques Berleur, Magda Hercheui, Lorenz M. Hilty |
Front Matter |
Part 1: Human Choice and Computers International Conference (HCC9)
|
What Kind of Information Society? Introduction to the HCC9 Conference Proceedings Jacques Berleur, Magda David Hercheui, Lorenz M. Hilty |
3-9 |
Ethics and ICT Governance
|
Ethics and ICT Governance Jacques Berleur, Diane Whitehouse, Philippe Goujon, Catherine Flick |
13-21 |
The Demographic Factors Affecting University Students' Intention to Pirate Software Linda Spark |
22-32 |
ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladesh Mizanur Rahman |
33-50 |
Exploring Digital Divide in the Maldives Mohamed Shareef, Adegboyega Ojo, Tomasz Janowski |
51-63 |
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in China Junbin Su, Vladislav V. Fomin |
64-72 |
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mapping Ansgar Mondorf, Maria A. Wimmer |
73-85 |
Money Laundering and FATF Compliance by the International Community Ali Alkaabi, George Mohay, Adrian Mccullagh, Nicholas Chantler |
86-97 |
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivity Philippe Goujon, Catherine Flick |
98-111 |
Virtual Technologies and Social Shaping
|
Virtual Technologies and Social Shaping David Kreps |
115-117 |
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performances Erika Pearson |
118-130 |
Virtuality Improves the Well Being of Seniors through Increasing Social Interaction Oliver K. Burmeister |
131-141 |
The Tragedy of the Virtual Commons as Manifested in the Death of Blogs John Lenarcic, Pradipta Sarkar |
142-149 |
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy? Sean Westwood |
150-160 |
A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds Nicholas C. Patterson, Michael Hobbs |
161-171 |
Surveillance and Privacy
|
Surveillance and Privacy Yola Georgiadou, Simone Fischer-Hübner |
175-177 |
Trends of Privacy and Surveillance in the Information Society Klaus Brunnstein |
178-179 |
Civil Society Must Publish Standards Documents Roger Clarke |
180-184 |
Citizen Surveillance of the State: A mirror for eGovernment? Jeroen Verplanke, Javier Martinez, Gianluca Miscione, Yola Georgiadou, David Coleman, Abdishakur Awil Hassan |
185-201 |
Privacy Enhanced Fraud Resistant Road Pricing Jaap-Henk Hoepman, George Huitema |
202-213 |
Privacy in Distributed Commercial Applications Nicolai Kuntze, Carsten Rudolph |
214-224 |
ICT and Sustainable Development
|
ICT and Sustainable Development Lorenz M. Hilty, Magda David Hercheui |
227-235 |
ICT and the Environment in Developing Countries: A Review of Opportunities and Developments John W. Houghton |
236-247 |
A Model and Selected Instances of Green and Sustainable Software Markus Dick, Stefan Naumann, Norbert Kuhn |
248-259 |
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systems Katharina Bunse, Matthias Vodicka |
260-268 |
A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic Aspects Fabiana Soares Santana, Claudio Barberato, Antonio Mauro Saraiva |
269-280 |
IT Support for Sustainable Development in Organizations Andreas Moeller, Arno Rolf |
281-291 |
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico John Dobson, Richard Duncombe, Brian Nicholson |
292-309 |
Part 2: Critical Information Infrastructure Protection Conference (CIP 2010)
|
Society - Totally Dependent upon ICT? Introduction to the CIP-2010 Conference Proceedings William Caelli |
313-314 |
C-SAW: Critical Information Infrastructure Protection through Simplification Ian Ellefsen, Sebastiaan Solms |
315-325 |
On Planning of FTTH Access Networks with and without Redundancy M. Tahir Riaz, Gustav H. Haraldsson, Jose G. Lopaz, Jens M. Pedersen, Ole B. Madsen |
326-337 |
A Distributed Denial of Service Testbed Desmond Schmidt, Suriadi Suriadi, Alan Tickle, Andrew Clark, George Mohay, Ejaz Ahmed, James Mackie |
338-349 |
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network Ester Ciancamerla, Chiara Foglietta, Davide Lefevre, Michele Minichino, Leonid Lev, Yosi Shneck |
350-362 |
Critical Infrastructure Protection Risk Modelling with Games Technology Martin Masek, Adrian Boeing, William Bailey |
363-372 |
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure António Grilo, Augusto Casaca, Mário Nunes, Carlos Fortunato |
373-383 |
Risk Modelling the Transition of SCADA System to IPv6 Suriadi Suriadi, Alan Tickle, Ejaz Ahmed, Jason Smith, Hasmukh Morarji |
384-395 |