Keywords:
Application software-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (455 pages)
Edition:
1st ed.
ISBN:
9783642042805
Series Statement:
IFIP Advances in Information and Communication Technology Series ; v.305
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6525984
DDC:
005.1
Language:
English
Note:
Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Session 1: e-Government 1 -- Electronic Voting Using Identity Domain Separation and Hardware Security Modules -- Introduction -- Core Elements of the EVITA Schema -- Encryption Using a Hardware Security Module -- Domain Separation and Identification Model -- Registration Domain - Creation and Use of ssPIN(v) -- Election Domain - Creation and Use of vPIN -- Sketch of the Cast Vote and Counting Phase -- Conclusions -- References -- Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed -- Introduction -- System Description -- Set-Top-Box, Smart Card and Client Application -- Server Application -- Security Issues -- System Characteristics: An Analysis -- Usability -- Advantages and Drawbacks -- A Real Test Bed (Election Night) -- Conclusions -- References -- Session 2: Security 1 -- Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia -- Introduction -- Background -- E-government -- Saudi Arabia and Its Adoption of Technology -- Digital and Cultural Gap -- Biometric Authentication Technology -- Examples of Biometric Technology in E-government Applications -- Concerns about the Use of Biometric Technology -- Methodology -- Interviews -- Questionnaire -- Data Collection and Analysis -- Results -- Interview Results of Managers -- Questionnaire Results of Government Employees -- Discussion -- Conclusion -- References -- Biovault: Biometrically Based Encryption -- Introduction -- Encryption Using a Secret Key or Biometric Data -- Secret Key Encryption -- Brief Introduction to BioVault Version 3.0 -- Symmetry and Asymmetry -- BioVault Components -- BioVault Mechanism -- Biometric Encryption Using BioVault -- Biometric Encryption Overview.
,
Biometric Encryption Discussion -- Conclusion -- References -- Session 3: e-Commerce 1 -- Value Encounters - Modeling and Analyzing Co-creation of Value -- Introduction -- Background: Value Modeling -- Motivating Example -- Value Encounter Modeling -- Value Encounter Analysis -- Value Encounter Ontology -- Discussion -- References -- A Model for Value-Added E-Marketplace Provisioning: Case Study from Alibaba.com -- Introduction -- Overview of the Online Marketplace -- Research Method -- Alibaba.com Strategies Analysis -- Trust -- Market -- Search -- Payment -- Tools -- Alibaba.com Industry Analysis and Discussion -- Conclusion -- References -- Networked Virtual Organizations:A Chance for Small and Medium Sized Enterprises on Global Markets -- Introduction -- Business Environment -- Concept of Networked Virtual Organizations -- Features of Networked Virtual Organizations -- NVO Requirements for SMEs -- Two Integrations: Computer Management Systems and Virtual Teams -- Ongoing Research -- Conclusions -- References -- Session 4: Modelling 1 -- A Rule-Based Approach of Creating and Executing Mashups -- Introduction -- Introduction to JSON Rules -- Creating Mashups with JSON Rules -- Monster Job Search -- Google Maps -- Modeling the Mashup Rules -- Towards a Common Sense for Mashup and Software as Service -- Conclusions and Future Work -- References -- Implementing a Rule-Based Contract Compliance Checker -- Introduction -- Contracts and Business Operations -- The EROP Language -- Language Example -- Architecture of the CCC -- Implementation of the CCC -- Implementation of the Relevance Engine -- The EROP Ontology -- The Historical Database -- Translation to Drools -- Declarations in Augmented Drools and EROP -- Actions in EROP and Augmented Drools -- Conditional Structures -- Examples of Translation to Augmented Drools -- Performance Considerations.
,
Related Work -- Conclusion and Future Work -- References -- Modeling Medical Ethics through Intelligent Agents -- Introduction -- Intelligent Agents and Medical Ethics -- Intelligent Agents in Medicine -- Moral Capacity -- Moral Decisions -- Modelling Morality with Extended Logic Programming -- Conclusions -- References -- Session 5: e-Government 2 -- Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience -- Introduction -- Requirements and Challenges to eDelivery Systems -- Architectural and Technical Considerations -- The Austrian Delivery System for eGovernment Applications -- Ongoing and Future Work -- Conclusions -- References -- Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model -- Introduction -- Transforming B2G Service Delivery -- B2G Interaction Modeling Based on a Web 2.0 Citizen-Centric Model -- MyCPP Platform -- Architecture -- Integration Layer -- Interaction Layer -- Application Layer -- Case Study -- Conclusions -- References -- Empowerment through Electronic Mandates - Best Practice Austria -- Introduction -- The Austrian E-ID System at a Glance -- Scenarios and Types of Representations -- Types of Representations -- Chained Mandates -- The Concept of Electronic Mandates in Austria -- Specialtiy: Professional Representatives -- Conclusions -- References -- Session 6: Security 2 -- Not All Adware Is Badware: Towards Privacy-Aware Advertising -- Introduction -- Advertising Basics -- The Privad Framework -- Profiling -- Ad Database Dissemination -- Related Work -- Future Directions and Conclusions -- References -- The Step Method - Battling Identity Theft Using E-Retailers' Websites -- Introduction -- Research Methodology -- Findings -- Trust-Building Information -- Empowering Information - How Customers Can Protect Themselves.
,
Supporting Information - What Companies Do When Identity Fraud Occurs -- Types of Information Policies on Websites -- Discussion -- "S" for Support -- "T" for Trust -- "E" for Empowerment -- "P" for Prevention -- Conclusion -- References -- Proposal and Implementation of SSH Client System Using Ajax -- Introduction -- Elemental Technologies -- Outline of Ajax -- Outline of SSH -- Existing Systems -- Outline of Existing Systems -- Problems of Existing Systems -- Proposed System -- Concept -- System Configurations -- Operation Outline -- Implementation -- Operation Check -- Support of Cell Phone -- Evaluations of Proposed System -- Safety Evaluation -- Performance Evaluation -- Conclusion -- References -- Session 7: e-Commerce 2 -- Smart Order Routing Technology in the New European Equity Trading Landscape -- Introduction -- Related Literature -- Methodology, Data and Assumptions -- Hypothesis and Statistical Testing -- Instrument and Market Choice -- Description of the Data Set -- Data Handling and Data Cleaning -- Results -- Conclusion -- References -- Algorithmic Trading Engines and Liquidity Contribution: The Blurring of "Traditional" Definitions -- Introduction -- Related Work and Derived Hypotheses -- Description of the Market and the Dataset -- Xetra Trading System -- Dataset -- Evaluation of Order Lifespan -- Evaluation of Order Types -- Evaluation of Liquidity Measures -- Pure Order Volume -- Option Value -- Passive Trading Counterparty -- Results -- Conclusion -- References -- Anonymous, Yet Trustworthy Auctions -- Introduction -- Requirements -- Assumptions and Notations -- Building Blocks -- Guarantees -- Bonuses and Compensations -- Design of an Anonymous, Yet Trustworthy Auction System -- Initial Certification -- Registration and Trust Calculation -- Auctions -- Updating Credentials -- Evaluation -- Related Work.
,
Conclusion and Future Work -- References -- Session 8: Modelling 2 -- Realizing Mobile Web Services for Dynamic Applications -- Introduction -- Existing and Related Work -- A Flexible Mobile Service Architecture -- An Example Configuration for Mobile Web Services -- Prototype Implementation and Use Case Scenario -- Conclusion and Future Work -- References -- Modifying the Balanced Scorecard for a Network Industry -- Introduction -- Theoretical Foundations of the BSC -- The Balanced Scorecard -- Literature Review -- Deriving a BSC for a Clearing House -- Central Counterparty Clearing -- The European Clearing Industry -- Stakeholders of a Clearing House -- Company Visions of Clearing Houses -- The Modified BSC for a Clearing House -- Validating the BSC -- Case Study -- Cause-and-Effect Relationships within the Modified BSC -- Conclusion and Further Research -- References -- Dynamic Component Selection for SCA Applications -- Introduction -- Related Work -- Service Component Architecture -- SCA Example Application -- Abstract and Concrete Composition -- SCA Applications as Composition Trees -- Transformation of Tree -- Semantic Description -- System Architecture and Implementation -- Architectural Components -- Implementation -- Evaluation -- Conclusions and Future Work -- References -- Session 9: User Interactions -- How to Research People's First Impressions of Websites? Eye-Tracking as a Usability Inspection Method and Online Focus Group Research -- Introduction -- Method -- Participants -- Eye Tracking and Online Focus Group Research on the Hungarian Governmental Portal -- Eye Tracking Research -- Results of the Eye Tracking Research -- Online Focus Group Research -- Discussion -- The Eye Tracking Research -- The Online Focus Group -- Semantic Differential -- Incomplete Sentences -- Conclusion -- References.
,
Transforming Collaborative Process Models into Interface Process Models by Applying an MDA Approach.
Permalink