index - What Kind of Information Society ? Governance, Virtuality, Surveillance, Sustainability, Resilience
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience
Jacques Berleur, Magda Hercheui, Lorenz M. Hilty
Front Matter

Part 1: Human Choice and Computers International Conference (HCC9)


What Kind of Information Society? Introduction to the HCC9 Conference Proceedings
Jacques Berleur, Magda David Hercheui, Lorenz M. Hilty
3-9

Ethics and ICT Governance


Ethics and ICT Governance
Jacques Berleur, Diane Whitehouse, Philippe Goujon, Catherine Flick
13-21
The Demographic Factors Affecting University Students' Intention to Pirate Software
Linda Spark
22-32
ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladesh
Mizanur Rahman
33-50
Exploring Digital Divide in the Maldives
Mohamed Shareef, Adegboyega Ojo, Tomasz Janowski
51-63
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in China
Junbin Su, Vladislav V. Fomin
64-72
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mapping
Ansgar Mondorf, Maria A. Wimmer
73-85
Money Laundering and FATF Compliance by the International Community
Ali Alkaabi, George Mohay, Adrian Mccullagh, Nicholas Chantler
86-97
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivity
Philippe Goujon, Catherine Flick
98-111

Virtual Technologies and Social Shaping


Virtual Technologies and Social Shaping
David Kreps
115-117
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performances
Erika Pearson
118-130
Virtuality Improves the Well Being of Seniors through Increasing Social Interaction
Oliver K. Burmeister
131-141
The Tragedy of the Virtual Commons as Manifested in the Death of Blogs
John Lenarcic, Pradipta Sarkar
142-149
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy?
Sean Westwood
150-160
A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds
Nicholas C. Patterson, Michael Hobbs
161-171

Surveillance and Privacy


Surveillance and Privacy
Yola Georgiadou, Simone Fischer-Hübner
175-177
Trends of Privacy and Surveillance in the Information Society
Klaus Brunnstein
178-179
Civil Society Must Publish Standards Documents
Roger Clarke
180-184
Citizen Surveillance of the State: A mirror for eGovernment?
Jeroen Verplanke, Javier Martinez, Gianluca Miscione, Yola Georgiadou, David Coleman, Abdishakur Awil Hassan
185-201
Privacy Enhanced Fraud Resistant Road Pricing
Jaap-Henk Hoepman, George Huitema
202-213
Privacy in Distributed Commercial Applications
Nicolai Kuntze, Carsten Rudolph
214-224

ICT and Sustainable Development


ICT and Sustainable Development
Lorenz M. Hilty, Magda David Hercheui
227-235
ICT and the Environment in Developing Countries: A Review of Opportunities and Developments
John W. Houghton
236-247
A Model and Selected Instances of Green and Sustainable Software
Markus Dick, Stefan Naumann, Norbert Kuhn
248-259
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systems
Katharina Bunse, Matthias Vodicka
260-268
A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic Aspects
Fabiana Soares Santana, Claudio Barberato, Antonio Mauro Saraiva
269-280
IT Support for Sustainable Development in Organizations
Andreas Moeller, Arno Rolf
281-291
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico
John Dobson, Richard Duncombe, Brian Nicholson
292-309

Part 2: Critical Information Infrastructure Protection Conference (CIP 2010)


Society - Totally Dependent upon ICT? Introduction to the CIP-2010 Conference Proceedings
William Caelli
313-314
C-SAW: Critical Information Infrastructure Protection through Simplification
Ian Ellefsen, Sebastiaan Solms
315-325
On Planning of FTTH Access Networks with and without Redundancy
M. Tahir Riaz, Gustav H. Haraldsson, Jose G. Lopaz, Jens M. Pedersen, Ole B. Madsen
326-337
A Distributed Denial of Service Testbed
Desmond Schmidt, Suriadi Suriadi, Alan Tickle, Andrew Clark, George Mohay, Ejaz Ahmed, James Mackie
338-349
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network
Ester Ciancamerla, Chiara Foglietta, Davide Lefevre, Michele Minichino, Leonid Lev, Yosi Shneck
350-362
Critical Infrastructure Protection Risk Modelling with Games Technology
Martin Masek, Adrian Boeing, William Bailey
363-372
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure
António Grilo, Augusto Casaca, Mário Nunes, Carlos Fortunato
373-383
Risk Modelling the Transition of SCADA System to IPv6
Suriadi Suriadi, Alan Tickle, Ejaz Ahmed, Jason Smith, Hasmukh Morarji
384-395