By Topic

Digital Society, 2008 Second International Conference on the

Date 10-15 Feb. 2008

Filter Results

Displaying Results 1 - 25 of 41
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (227 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • Committees

    Page(s): ix - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • The E-Mail Honeypot System Concept, Implementation and Field Test Results

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (478 KB) |  | HTML iconHTML  

    This paper describes the concept and implementation of the "E-mail honeypot system" (EHS) which is designed to automatically receive, categorize, analyze and archive unsolicited mails (spam). An evaluation of the various system components and the overall system in a lab environment and in a field test confirms the feasibility of the EHS concept with respect to functionality, detection accuracy and performance. In addition, some results from a field test running for over a year are provided exemplifying the potential of the EHS to provide a statistical evaluation of spam activities as well as to provide some insight into spam mechanisms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention

    Page(s): 7 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (563 KB) |  | HTML iconHTML  

    With rise of the potential risks from different cyberattacks on the ICT systems the investment in security technology is growing and is becoming a serious economic issue to many organizations. The assessment of the appropriate investment that is economically affordable and provides enough protection of the enterprise information system is an issue that is analysed in this paper. Identification of the assets, the threats, the vulnerabilities of the ICT systems are presented and the methods for quantification of the necessary investment. The paper concludes with a recommendation for a standard approach for optimal selection of security technology investment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Organizational Privacy Patterns

    Page(s): 15 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    Privacy has been a hot topic and received a lot of discussion in recent years. European legislation contains strong privacy oriented regulations and rules which are poorly understood and comprehended by European businesses. Unfortunately courts do not have enough practice to bring the privacy abuses to justice. In addition to all this privacy enhancing technologies (PETs) that exist today are not enough to solve the contradicting requirements of informational systems resulting from business environments and privacy regulations. A large gap exists between privacy regulations on one hand and available privacy technologies on the other. We believe that this gap could and should be bridged by organizational privacy patterns (OPP). OPPs are abstractions of real world situations and problems that businesses run into. Organizational Privacy Patterns capture the problem, the context of the generic problem and the proven solutions to the problem. In this paper we present a first set of privacy organizational patterns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam Mail Reduces Economic Effects

    Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    From the view of economics, the authors analyze the disadvantages of Spam mail. For this purpose, we introduce a production function model and estimate the effect of Spam mail. As a result, we find that the existence of Spam mail decreases not only the level of the GDP (Gross Domestic Product), which is about 464 billion yen (0.1% of the Japanese GDP), but also reduces labor productivity. This implies that the existence of Spam mail directly and indirectly damages the entire economy. Therefore, we suggest a full-fledged introduction of "Outbound Port 25 Blocking " to all ISPs (Internet service providers) and "sendmail authentication" to all firms as effective Spam mail counter- measures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordination of a Multi-commodity Supply Chain with Multiple Members Using Flow Networks

    Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (463 KB) |  | HTML iconHTML  

    A successful supply chain responds to customer's requirements with minimum cost. In general, organizations which are members of a supply chain are independent of each other and try to maximize their own benefits. Appropriate behavior of each member is necessary but does not suffice to have a competitive supply chain. A supply chain coordination mechanism leads members to behave such that the entire supply chain satisfies customer demand with minimum costs. Previous research works which provided formally analyzed coordination mechanisms have made assumptions about restrictions on the number of supply chain stages and members in each stage. Moreover, multi-commodity case has not been investigated in the context of supply chain coordination yet. This paper exploits flow networks concept to propose a coordination mechanism which is applicable to supply chains with multiple members, multiple stages and presence of multi-commodity case while each commodity is composed of several basic components. In the proposed solution an entity named supply chain optimizer (SCO) which is actually an e-hub, gathers supply chain state information and after necessary computations, informs members of supply chain of optimal decisions about orders. The goal is to minimize operational costs of the whole supply chain while satisfying customer demand. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation Of Embedded Data Acquisition System Based on USB and Flash Multimediacard Memory

    Page(s): 31 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (610 KB) |  | HTML iconHTML  

    Main research in this paper is the DA(data acquisition) system design which based on the USB and MMC. According a USB's chip correlation hardware information, USB protocol, DA systematic structure and singlechip computer information, a hardware development solution was come out in the design. This solution consists of the data acquisition module hardware development design, singlechip computer data acquisition program development , USB's installation interface design and debug, embedded software(SW) and file system design. Finally we achieves the DA system which is more speedly, without delay and more dependable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach

    Page(s): 35 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (393 KB) |  | HTML iconHTML  

    This work will be consider the relationship between state authority, Internet policies and civil rights in three countries: Italy (EU), Serbia (Europe) and Burma-Myanmar1 (Asia). It will provide an overview about the debate existing in these countries, where it is possible to point out a common trend of restrictions of civil rights due to surveillance and control actions of the authorities on the ICTs. If, in the extreme case of Burma-Myanmar, these actions consist in a ban on using the Internet freely for the citizens, in the other countries they create legal contradictions not easily solved, which may prefigure increasing restrictive measures for the future and risks for the e-democracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Who's Afraid of High Def?' Institutional Factors Influencing HDTV Diffusion in the Netherlands

    Page(s): 42 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    Since digital HDTV has made an entrance in the Netherlands, HD ready' TV sets are sold and HDTV cable subscription services are available. In contrast, no Dutch TV channel offers HD content and publicity is mostly negative. This paper analyses the economical, organizational, historical and cultural background of HD diffusion in the Netherlands. Results show that the diffusion of HDTV is influenced by international standardization of peripheral equipment, competing TV uses and a deadlock in content broadcasting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Networks and Sustainability: Do We Need the Government?

    Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (443 KB) |  | HTML iconHTML  

    The role of information in promoting development has been well researched and documented, and there has been much interest in harnessing ICT (Information and Communication Technology) for this purpose. The dynamics of this transfer and its overall effectiveness depends on social capital and how the synergies generated by it can impact the co-ordination between member-nodes. In this paper, we seek to understand this synergy in the context of ICT implementation efforts in rural India. The sustenance of a digital network depends on co-operation between member-nodes of the network. In the beginning, the Government undertakes an active role in financing and setting up projects as well as playing a regulatory role, with the expectation that in time the network will become capable of functioning without Central support. A review of current ICT interventions indicates the opposite. We propose that adopting a more community centric design for these interventions can improve their sustainability and lead to the evolution of a more complex and multi functional ICT enabled socio-technical system. In this perspective, we present the concept of digital ecosystems (DE) as potential conduit of ICT to the masses.. The merits of this approach are examined and the role of the Government in building this system is described. We concludThe role of information in promoting development has been well researched and documented, and there has been much interest in harnessing ICT (Information and Communication Technology) for this purpose. The dynamics of this transfer and its overall effectiveness depends on social capital and how the synergies generated by it can impact the co-ordination between member-nodes. In this paper, we seek to understand this synergy in the context of ICT implementation efforts in rural India. The sustenance of a digital network depends on co-operation between member-nodes of the network. In the beginning, the Government undertakes an active role in financing and se- - tting up projects as well as playing a regulatory role, with the expectation that in time the network will become capable of functioning without Central support. A review of current ICT interventions indicates the opposite. We propose that adopting a more community centric design for these interventions can improve their sustainability and lead to the evolution of a more complex and multi functional ICT enabled socio-technical system. In this perspective, we present the concept of digital ecosystems (DE) as potential conduit of ICT to the masses. The merits of this approach are examined and the role of the Government in building this system is described. We conclude by presenting the case of the DEAL (Digital Ecosystem for Agriculture and Livelihood) project, a rural development initiative in agriculture in Northern India.e by presenting the case of the DEAL (Digital Ecosystem for Agriculture and Livelihood) project, a rural development initiative in agriculture in Northern India. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-issue Negotiation Mechanism with Interdependent Negotiation Issues

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    In this paper, we present a negotiation mechanism for multi-issue negotiations by which issues are interdependent. The negotiator agents not only looking for a mutually acceptable contract but also try to unearth the contract which brings the maximum utility to them. Agents conduct the negotiation by themselves and no intermediary agent proposes the contracts to them. To obtain the best contract, agents use a simulated annealing optimization method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Automated Evaluation for Multi-document Summarization Using Content-Based Similarity

    Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    We introduce an automated evaluation method based on content similarity, and construct a vector space of words, on which we compute cosine similarity of automated summaries and human summaries. The method is tested on DUC 2005 data, and produces acceptable results, which may avoid some shortcomings of n-gram. We also test the effects of stopwords and stemming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Flexicurity Labour Market Policies in the European Union

    Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    One of central policy monitoring problems is operationally describing and visually representing the policy development. It relates to the EU flexicurity policy (= flexibilization of employment relations compensated by advantages in employment security and social security). To the end of policy monitoring, two indices, of flexible work and of precarious work, are derived from the Fourth European Survey of Working Conditions 2005. They reveal a statistical dependence between flexibility and precariousness of work, showing that employment flexibility has the strongest negative effect on employ ability. It implies that flexicurity cannot be consistently implemented as proposed by the European Commission. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Management for Disparate Etruscan Cultural Heritage

    Page(s): 70 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (576 KB) |  | HTML iconHTML  

    This paper introduces the TARCHNA approach to managing and presenting contextualised heritage content. The system uses the CIDOC CRM ontology to consolidate a virtual repository of geographically disparate heritage databases and present a holistic view of a fragmented heritage. While previous approaches to presenting heritage collections have focused on the browse and search paradigm, the TARCHNA system uses narrative concepts as a means of presenting and re-using contextualised heritage artefacts within a broader cultural setting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View-Point Oriented Manipulation of Concepts: A Matching Perspective

    Page(s): 75 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    In this paper, we discuss the application of a method called concept composition in manipulating a concept from the view-point of other concepts. In this regard, a matching procedure is presented which is capable of justifying the way the items derived from a concept can be observed within the framework of those derived from another concept. The proposed approach is expected to be successfully applicable in research & innovation environments where the final objective is to create new chunks of knowledge based on the existing concepts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Collection-Based Knowledge Representation: Application to Geo-political Risks and Crisis Management

    Page(s): 81 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (597 KB) |  | HTML iconHTML  

    The paper aims at presenting the use of a collection based knowledge representation to improve a geopolitical risks and crisis management system. Initially, the system was built onto classic ontological knowledge representation for the use in a multi-agent system. Events occurring were classified using object matching with model events. After comparisons with type scenarios, the system could predict if a crisis can happen. A better understanding of crisis appeared and the system was completely working but, only if the main agent which has the task of questioning the user was replaced with a human because an ontological model is not well adapted for such work. This gives us motive to reconsider the role and the design of the system, stressing the need of a better knowledge management. A collection based knowledge representation seemed to be a good alternative to gather and organize critical information without losing time and information in a type matching process. It is one of the first times this concept of collection, well known in the artistic domain is used in an IT system. We will explain this particular knowledge representation through the successful example of the CHEOPS Project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA)

    Page(s): 88 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (309 KB) |  | HTML iconHTML  

    The extensive amounts of knowledge and data stored in medical databases require the development of specialized tools for storing and accessing of data, data analysis and effective use of stored knowledge of data. The goal is to present how methods and tools for intelligent data analysis are helpful in narrowing the increasing gap between data gathering and data comprehension. This goal is achieved by applying Association Rules Technique to help in analyzing and retrieving hidden patterns for a large volume of data collected in a medical database for a large hospital. The approach used led to results normally unattainable using conventional techniques. Specifically, an episode database for Nephrology examinations, signs, symptoms and diagnosis is used. Theoretical and practical features for the Incremental Enhanced Association Rule Algorithm are presented. These features include Rules, Classification, Clarity, Automation, Accuracy, Relational Database Management Systems (RDBMS) and Raw Data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary Based Service Evaluation for Elderly People and Healthcare Professionals in Residential Home Care Units

    Page(s): 93 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    This article reports the first step of a human factor evaluation process based on user needs analysis. Our goal is to design assistive services dedicate to elderly people living along with healthcare professionals in residential home care units in France. After introducing MEDETIC non profit organization and its research in healthcare and wellbeing design services, we will report the qualitative evaluation that we performed to retrieve user needs and organizational attitudes toward ICT expressed by this population. A total of 24 elderly dependent people experiencing several types of limitations (sensory, physical, cognitive or none) and leaving in 3 different residential home care units in France and 13 healthcare professionals (4 managers, 4 nurses and 5 caregivers) were interviewed in order to measure user needs and technology acceptance. Results of this study provide qualitative support to healthcare service definition in community living ambient assisted living domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Cross-Usage of Public Health Systems - A Holistic Approach to Ask the Expert Systems and Online Communities

    Page(s): 102 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    The number of users of health systems on the Internet has increased at a rapid pace. The systems are browsed for health information, and online interactions take place with medical experts as well as with people who have similar health problems. This paper presents a study of the usage of two different types of health systems: Ask the Expert system and online communities for people with overweight. The study focused on the different types of questions as well as information, advice and recommendations posted in the systems. Starting point of the study was the questions and answers presented in the Ask the Expert system. The results show how the systems serve as complements, and suggestions on how to enable the users to easily cross-use the systems are presented. Such development could help the users to get a fuller picture and better understanding of different health issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration from Regional to a National eHealth Network

    Page(s): 107 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Finland is being transformed into a knowledge economy driven by information and communication technologies - 96 % of primary care health centres, 95 % of hospital districts and 89 % of private sector service providers use an electronic patient record (EPR). The governance and funding of the Finnish health care system is very decentralized and the lack of standards has led to a broad spectrum of one-off systems with little technical interoperability. National strategies to overcome this challenge has created sharable electronic health records (EHR) by supporting a collection of federated interoperable repositories with regional middleware services. In the Hospital District of Helsinki and Uusimaa an established regional eHealth network (RHIN) connects 24 public hospitals, 29 municipal health centers (primary care) and two private health care clinics. There are 6.000 end-users, information from 1,4 million citizens and 12 million links to EPRs. Migration to a national eHealth network (NHIN) and centralized eArchive providing a platform that delivers a longitudinal view of a patient's relevant health records (core data set) is currently underway and plans for coordinated architecture and transformation from regional to national sharing of health care information and ePrescription are drawn. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.