By Topic

Digital Society, 2008 Second International Conference on the

Date 10-15 Feb. 2008

Filter Results

Displaying Results 1 - 25 of 41
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (25 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (227 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2008 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committees

    Publication Year: 2008 , Page(s): ix - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • The E-Mail Honeypot System Concept, Implementation and Field Test Results

    Publication Year: 2008 , Page(s): 1 - 6
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (478 KB) |  | HTML iconHTML  

    This paper describes the concept and implementation of the "E-mail honeypot system" (EHS) which is designed to automatically receive, categorize, analyze and archive unsolicited mails (spam). An evaluation of the various system components and the overall system in a lab environment and in a field test confirms the feasibility of the EHS concept with respect to functionality, detection accuracy and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention

    Publication Year: 2008 , Page(s): 7 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (563 KB) |  | HTML iconHTML  

    With rise of the potential risks from different cyberattacks on the ICT systems the investment in security technology is growing and is becoming a serious economic issue to many organizations. The assessment of the appropriate investment that is economically affordable and provides enough protection of the enterprise information system is an issue that is analysed in this paper. Identification of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Organizational Privacy Patterns

    Publication Year: 2008 , Page(s): 15 - 19
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    Privacy has been a hot topic and received a lot of discussion in recent years. European legislation contains strong privacy oriented regulations and rules which are poorly understood and comprehended by European businesses. Unfortunately courts do not have enough practice to bring the privacy abuses to justice. In addition to all this privacy enhancing technologies (PETs) that exist today are not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam Mail Reduces Economic Effects

    Publication Year: 2008 , Page(s): 20 - 24
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    From the view of economics, the authors analyze the disadvantages of Spam mail. For this purpose, we introduce a production function model and estimate the effect of Spam mail. As a result, we find that the existence of Spam mail decreases not only the level of the GDP (Gross Domestic Product), which is about 464 billion yen (0.1% of the Japanese GDP), but also reduces labor productivity. This imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordination of a Multi-commodity Supply Chain with Multiple Members Using Flow Networks

    Publication Year: 2008 , Page(s): 25 - 30
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (463 KB) |  | HTML iconHTML  

    A successful supply chain responds to customer's requirements with minimum cost. In general, organizations which are members of a supply chain are independent of each other and try to maximize their own benefits. Appropriate behavior of each member is necessary but does not suffice to have a competitive supply chain. A supply chain coordination mechanism leads members to behave such that the entir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation Of Embedded Data Acquisition System Based on USB and Flash Multimediacard Memory

    Publication Year: 2008 , Page(s): 31 - 34
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (610 KB) |  | HTML iconHTML  

    Main research in this paper is the DA(data acquisition) system design which based on the USB and MMC. According a USB's chip correlation hardware information, USB protocol, DA systematic structure and singlechip computer information, a hardware development solution was come out in the design. This solution consists of the data acquisition module hardware development design, singlechip computer dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach

    Publication Year: 2008 , Page(s): 35 - 41
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (393 KB) |  | HTML iconHTML  

    This work will be consider the relationship between state authority, Internet policies and civil rights in three countries: Italy (EU), Serbia (Europe) and Burma-Myanmar1 (Asia). It will provide an overview about the debate existing in these countries, where it is possible to point out a common trend of restrictions of civil rights due to surveillance and control actions of the authorities on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Who's Afraid of High Def?' Institutional Factors Influencing HDTV Diffusion in the Netherlands

    Publication Year: 2008 , Page(s): 42 - 48
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    Since digital HDTV has made an entrance in the Netherlands, HD ready' TV sets are sold and HDTV cable subscription services are available. In contrast, no Dutch TV channel offers HD content and publicity is mostly negative. This paper analyses the economical, organizational, historical and cultural background of HD diffusion in the Netherlands. Results show that the diffusion of HDTV is influenced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Networks and Sustainability: Do We Need the Government?

    Publication Year: 2008 , Page(s): 49 - 54
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (443 KB) |  | HTML iconHTML  

    The role of information in promoting development has been well researched and documented, and there has been much interest in harnessing ICT (Information and Communication Technology) for this purpose. The dynamics of this transfer and its overall effectiveness depends on social capital and how the synergies generated by it can impact the co-ordination between member-nodes. In this paper, we seek ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-issue Negotiation Mechanism with Interdependent Negotiation Issues

    Publication Year: 2008 , Page(s): 55 - 59
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    In this paper, we present a negotiation mechanism for multi-issue negotiations by which issues are interdependent. The negotiator agents not only looking for a mutually acceptable contract but also try to unearth the contract which brings the maximum utility to them. Agents conduct the negotiation by themselves and no intermediary agent proposes the contracts to them. To obtain the best contract, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Automated Evaluation for Multi-document Summarization Using Content-Based Similarity

    Publication Year: 2008 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    We introduce an automated evaluation method based on content similarity, and construct a vector space of words, on which we compute cosine similarity of automated summaries and human summaries. The method is tested on DUC 2005 data, and produces acceptable results, which may avoid some shortcomings of n-gram. We also test the effects of stopwords and stemming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Flexicurity Labour Market Policies in the European Union

    Publication Year: 2008 , Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    One of central policy monitoring problems is operationally describing and visually representing the policy development. It relates to the EU flexicurity policy (= flexibilization of employment relations compensated by advantages in employment security and social security). To the end of policy monitoring, two indices, of flexible work and of precarious work, are derived from the Fourth European Su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Management for Disparate Etruscan Cultural Heritage

    Publication Year: 2008 , Page(s): 70 - 74
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (576 KB) |  | HTML iconHTML  

    This paper introduces the TARCHNA approach to managing and presenting contextualised heritage content. The system uses the CIDOC CRM ontology to consolidate a virtual repository of geographically disparate heritage databases and present a holistic view of a fragmented heritage. While previous approaches to presenting heritage collections have focused on the browse and search paradigm, the TARCHNA ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View-Point Oriented Manipulation of Concepts: A Matching Perspective

    Publication Year: 2008 , Page(s): 75 - 80
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    In this paper, we discuss the application of a method called concept composition in manipulating a concept from the view-point of other concepts. In this regard, a matching procedure is presented which is capable of justifying the way the items derived from a concept can be observed within the framework of those derived from another concept. The proposed approach is expected to be successfully app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Collection-Based Knowledge Representation: Application to Geo-political Risks and Crisis Management

    Publication Year: 2008 , Page(s): 81 - 87
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (597 KB) |  | HTML iconHTML  

    The paper aims at presenting the use of a collection based knowledge representation to improve a geopolitical risks and crisis management system. Initially, the system was built onto classic ontological knowledge representation for the use in a multi-agent system. Events occurring were classified using object matching with model events. After comparisons with type scenarios, the system could predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA)

    Publication Year: 2008 , Page(s): 88 - 92
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (309 KB) |  | HTML iconHTML  

    The extensive amounts of knowledge and data stored in medical databases require the development of specialized tools for storing and accessing of data, data analysis and effective use of stored knowledge of data. The goal is to present how methods and tools for intelligent data analysis are helpful in narrowing the increasing gap between data gathering and data comprehension. This goal is achieved... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary Based Service Evaluation for Elderly People and Healthcare Professionals in Residential Home Care Units

    Publication Year: 2008 , Page(s): 93 - 101
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    This article reports the first step of a human factor evaluation process based on user needs analysis. Our goal is to design assistive services dedicate to elderly people living along with healthcare professionals in residential home care units in France. After introducing MEDETIC non profit organization and its research in healthcare and wellbeing design services, we will report the qualitative e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Cross-Usage of Public Health Systems - A Holistic Approach to Ask the Expert Systems and Online Communities

    Publication Year: 2008 , Page(s): 102 - 106
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    The number of users of health systems on the Internet has increased at a rapid pace. The systems are browsed for health information, and online interactions take place with medical experts as well as with people who have similar health problems. This paper presents a study of the usage of two different types of health systems: Ask the Expert system and online communities for people with overweight... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration from Regional to a National eHealth Network

    Publication Year: 2008 , Page(s): 107 - 110
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Finland is being transformed into a knowledge economy driven by information and communication technologies - 96 % of primary care health centres, 95 % of hospital districts and 89 % of private sector service providers use an electronic patient record (EPR). The governance and funding of the Finnish health care system is very decentralized and the lack of standards has led to a broad spectrum of on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.