|
Part 1 Human Choice and Computers International Conference (HCC9) |
|
|
|
What Kind of Information Society? Introduction to the HCC9 Conference Proceedings |
|
|
3 | (10) |
|
|
|
|
Section 1 Ethics and ICT Governance |
|
|
|
Ethics and ICT Governance |
|
|
13 | (9) |
|
|
|
|
|
The Demographic Factors Affecting University Students' Intention to Pirate Software |
|
|
22 | (11) |
|
|
ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladesh |
|
|
33 | (18) |
|
|
Exploring Digital Divide in the Maldives |
|
|
51 | (13) |
|
|
|
|
Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in China |
|
|
64 | (9) |
|
|
|
The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mapping |
|
|
73 | (13) |
|
|
|
Money Laundering and FATF Compliance by the International Community |
|
|
86 | (12) |
|
|
|
|
|
Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivity |
|
|
98 | (17) |
|
|
|
Section 2 Virtual Technologies and Social Shaping |
|
|
|
Virtual Technologies and Social Shaping |
|
|
115 | (3) |
|
|
Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performances |
|
|
118 | (13) |
|
|
Virtuality Improves the Well Being of Seniors through Increasing Social Interaction |
|
|
131 | (11) |
|
|
The Tragedy of the Virtual Commons as Manifested in the Death of Blogs |
|
|
142 | (8) |
|
|
|
How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy? |
|
|
150 | (11) |
|
|
A Multidiscipline Approach to Governing Virtual Property theft in Virtual Worlds |
|
|
161 | (14) |
|
|
|
Section 3 Surveillance and Privacy |
|
|
|
|
175 | (3) |
|
|
|
Trends of Privacy and Surveillance in the Information Society (Extended Abstract) |
|
|
178 | (2) |
|
|
Civil Society Must Publish Standards Documents |
|
|
180 | (5) |
|
|
Citizen Surveillance of the State: A Mirror for eGovernment? |
|
|
185 | (17) |
|
|
|
|
|
|
|
Privacy Enhanced Fraud Resistant Road Pricing (Extended Abstract) |
|
|
202 | (12) |
|
|
|
Privacy in Distributed Commercial Applications |
|
|
214 | (13) |
|
|
|
Section 4 ICT and Sustainable Development |
|
|
|
ICT and Sustainable Development |
|
|
227 | (9) |
|
|
|
ICT and the Environment in Developing Countries: A Review of Opportunities and Developments |
|
|
236 | (12) |
|
|
A Model and Selected Instances of Green and Sustainable Software |
|
|
248 | (12) |
|
|
|
|
Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systems |
|
|
260 | (9) |
|
|
|
A Reference Process to Design Information Systems for Sustainable design based on LCA, PSS, Social and Economic Aspects |
|
|
269 | (12) |
|
|
|
|
IT Support for Sustainable Development in Organizations |
|
|
281 | (11) |
|
|
|
Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico |
|
|
292 | (21) |
|
|
|
|
Part 2 Critical Information Infrastructure Protection Conference (CIP 2010) |
|
|
|
Society - Totally Dependent Upon ICT? Introduction to the CIP 2010 Conference Proceedings |
|
|
313 | (2) |
|
|
C-SAW: Critical Information Infrastructure Protection through Simplification |
|
|
315 | (11) |
|
|
|
On Planning of FTTH Access Networks with and without Redundancy |
|
|
326 | (12) |
|
|
|
|
|
|
A Distributed Denial of Service Testbed |
|
|
338 | (12) |
|
|
|
|
|
|
|
|
Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network |
|
|
350 | (13) |
|
|
|
|
|
|
|
Critical Infrastructure Protection Risk Modelling with Games Technology |
|
|
363 | (10) |
|
|
|
|
Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure |
|
|
373 | (11) |
|
|
|
|
|
Risk Modelling the Transition of SCADA System to IPv6 |
|
|
384 | (13) |
|
|
|
|
|
Author Index |
|
397 | |