index - What Kind of Information Society ? Governance, Virtuality, Surveillance, Sustainability, Resilience
   


Full Text Documents

36

Search


Table of Contents
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience
Jacques Berleur, Magda Hercheui, Lorenz M. Hilty
Front Matter

Part 1: Human Choice and Computers International Conference (HCC9)


What Kind of Information Society? Introduction to the HCC9 Conference Proceedings
Jacques Berleur, Magda David Hercheui, Lorenz M. Hilty
3-9

Ethics and ICT Governance


Ethics and ICT Governance
Jacques Berleur, Diane Whitehouse, Philippe Goujon, Catherine Flick
13-21
The Demographic Factors Affecting University Students' Intention to Pirate Software
Linda Spark
22-32
ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladesh
Mizanur Rahman
33-50
Exploring Digital Divide in the Maldives
Mohamed Shareef, Adegboyega Ojo, Tomasz Janowski
51-63
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in China
Junbin Su, Vladislav V. Fomin
64-72
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mapping
Ansgar Mondorf, Maria A. Wimmer
73-85
Money Laundering and FATF Compliance by the International Community
Ali Alkaabi, George Mohay, Adrian Mccullagh, Nicholas Chantler
86-97
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivity
Philippe Goujon, Catherine Flick
98-111

Virtual Technologies and Social Shaping


Virtual Technologies and Social Shaping
David Kreps
115-117
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performances
Erika Pearson
118-130
Virtuality Improves the Well Being of Seniors through Increasing Social Interaction
Oliver K. Burmeister
131-141
The Tragedy of the Virtual Commons as Manifested in the Death of Blogs
John Lenarcic, Pradipta Sarkar
142-149
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy?
Sean Westwood
150-160
A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds
Nicholas C. Patterson, Michael Hobbs
161-171

Surveillance and Privacy


Surveillance and Privacy
Yola Georgiadou, Simone Fischer-Hübner
175-177
Trends of Privacy and Surveillance in the Information Society
Klaus Brunnstein
178-179
Civil Society Must Publish Standards Documents
Roger Clarke
180-184
Citizen Surveillance of the State: A mirror for eGovernment?
Jeroen Verplanke, Javier Martinez, Gianluca Miscione, Yola Georgiadou, David Coleman, Abdishakur Awil Hassan
185-201
Privacy Enhanced Fraud Resistant Road Pricing
Jaap-Henk Hoepman, George Huitema
202-213
Privacy in Distributed Commercial Applications
Nicolai Kuntze, Carsten Rudolph
214-224

ICT and Sustainable Development


ICT and Sustainable Development
Lorenz M. Hilty, Magda David Hercheui
227-235
ICT and the Environment in Developing Countries: A Review of Opportunities and Developments
John W. Houghton
236-247
A Model and Selected Instances of Green and Sustainable Software
Markus Dick, Stefan Naumann, Norbert Kuhn
248-259
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systems
Katharina Bunse, Matthias Vodicka
260-268
A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic Aspects
Fabiana Soares Santana, Claudio Barberato, Antonio Mauro Saraiva
269-280
IT Support for Sustainable Development in Organizations
Andreas Moeller, Arno Rolf
281-291
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico
John Dobson, Richard Duncombe, Brian Nicholson
292-309

Part 2: Critical Information Infrastructure Protection Conference (CIP 2010)


Society - Totally Dependent upon ICT? Introduction to the CIP-2010 Conference Proceedings
William Caelli
313-314
C-SAW: Critical Information Infrastructure Protection through Simplification
Ian Ellefsen, Sebastiaan Solms
315-325
On Planning of FTTH Access Networks with and without Redundancy
M. Tahir Riaz, Gustav H. Haraldsson, Jose G. Lopaz, Jens M. Pedersen, Ole B. Madsen
326-337
A Distributed Denial of Service Testbed
Desmond Schmidt, Suriadi Suriadi, Alan Tickle, Andrew Clark, George Mohay, Ejaz Ahmed, James Mackie
338-349
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network
Ester Ciancamerla, Chiara Foglietta, Davide Lefevre, Michele Minichino, Leonid Lev, Yosi Shneck
350-362
Critical Infrastructure Protection Risk Modelling with Games Technology
Martin Masek, Adrian Boeing, William Bailey
363-372
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure
António Grilo, Augusto Casaca, Mário Nunes, Carlos Fortunato
373-383
Risk Modelling the Transition of SCADA System to IPv6
Suriadi Suriadi, Alan Tickle, Ejaz Ahmed, Jason Smith, Hasmukh Morarji
384-395