rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642154782

What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings

by ; ;
  • ISBN13:

    9783642154782

  • ISBN10:

    3642154786

  • Format: Hardcover
  • Copyright: 2010-09-26
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $149.00

Summary

This book constitutes the refereed proceedings of the 9th IFIP TC 9 International Conference on Human Choice and Computers, HCC9 2010 and the 1st IFIP TC 11 International Conference on Critical Information Infrastructure Protection, CIP 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010. The 27 revised full papers presented at HCC9 were carefully reviewed and selected from numerous submissions. The papers are organized in four tracks: ethics and ICT governance, virtual technologies and social shaping, surveillance and privacy, and ICT and sustainable development. The 7 revised full papers presented at CIP 2010 were carefully reviewed and selected from numerous submissions. They address current thinking and research in critical information infrastructure protection.

Table of Contents

Human Choice and Computers International Conference (HCC9)
What Kind of Information Society? Introduction to the HCC9 Conference Proceedingsp. 3
Ethics and ICT Governance
Ethics and ICT Governancep. 13
The Demographic Factors Affecting University Students' Intention to Pirate Softwarep. 22
ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladeshp. 33
Exploring Digital Divide in the Maldivesp. 51
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in Chinap. 64
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mappingp. 73
Money Laundering and FATF Compliance by the International Communityp. 86
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivityp. 98
Virtual Technologies and Social Shaping
Virtual Technologies and Social Shapingp. 115
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performancesp. 118
Virtuality Improves the Well Being of Seniors through Increasing Social Interactionp. 131
The Tragedy of the Virtual Commons as Manifested in the Death of Blogsp. 142
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy?p. 150
A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worldsp. 161
Surveillance and Privacy
Surveillance and Privacyp. 175
Trends of Privacy and Surveillance in the Information Society (Extended Abstract)p. 178
Civil Society Must Publish Standards Documentsp. 180
Citizen Surveillance of the State: A Mirror for eGovernment?p. 185
Privacy Enhanced Fraud Resistant Road Pricing (Extended Abstract)p. 202
Privacy in Distributed Commercial Applicationsp. 214
ICT and Sustainable Development
ICT and Sustainable Developmentp. 227
ICT and the Environment in Developing Countries: A Review of Opportunities and Developmentsp. 236
A Model and Selected Instances of Green and Sustainable Softwarep. 248
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systemsp. 260
A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic Aspectsp. 269
It Support for Sustainable Development in Organizationsp. 281
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexicop. 292
Critical Information Infrastructure Protection Conference (CIP 2010)
Society - Totally Dependent Upon ICT? Introduction to the CIP 2010 Conference Proceedingsp. 313
C-SAW: Critical Information Infrastructure Protection through Simplificationp. 315
On Planning of FTTH Access Networks with and without Redundancyp. 326
A Distributed Denial of Service Testbedp. 338
Discrete Event Simulation of Qos of a SCADA System Interconnecting a Power Grid and a Telco Networkp. 350
Critical Infrastructure Protection Risk Modelling with Games Technologyp. 363
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructurep. 373
Risk Modelling the Transition of SCADA System to IPv6p. 384
Author Indexp. 397
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program