Home // ICDS

ICDS 2012, The Sixth International Conference on Digital Society

Type: conference

Notes: IARIA Conference.

Editors:
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Gregorio Martinez, University of Murcia, Spain
Lasse Berntzen, Vestfold University College - Tønsberg, Norway
Åsa Smedberg, Stockholm University/The Royal Institute of Technology, Sweden

ISSN: 2308-3956

ISBN: 978-1-61208-176-2

Location: Valencia, Spain

Dates: from January 30, 2012 to February 4, 2012

Articles: there are 27 articles

Polish E-Government at Local Level: Heavy Road to Citizens’ Empowerment
Leszek Porebski
keywords: e-government; e-democracy; websites content; local democracy; local government.

Community Detection based on Structural and Attribute Similarities
The Anh Dang and Emmanuel Viennet
keywords: social network, community detection, clustering

The Evolution of the e-ID card in Belgium: Data Privacy and Multi-Application Usage
Alea Fairchild and Bruno de Vuyst
keywords: e-ID; privacy; transparency; applications.

Analyzing Social Roles using Enriched Social Network on On-Line Sub-Communities.
Mathilde Forestier, Julien Velcin, and Djamel A. Zighed
keywords: Social role; Social network; On-line community.

Unique Domain-specific Identification for E-Government Applications
Peter Schartner
keywords: e-government; system-wide unique identifier; domain-specific identifier; pseudonyms; anonymity; UUIDs; GUIDs.

Sociological Reflections on E-government
Maria João Simões
keywords: e-government; participation; technology; society

SSEDIC: Building a Thematic Network for European eID
Victoriano Giralt, Hugo Kerschot, and Jon Shamah
keywords: Electronic Identity; Single European Digital Community; Digital Agenda for Europe.

Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems
Adrian Rahaman and Martina Angela Sasse
keywords: identity; identity mangaement system; organisation; government; policy

Towards the Automatic Management of Vaccination Process in Jordan
Edward Jaser and Islam Ahmad
keywords: information and communications technology for development; health systems mobile application; vaccination; rural areas.

Three Dimensional Printing: An Introduction for Information Professionals
Julie Marcoux and Kenneth-Roy Bonin
keywords: 3D printing; three dimensional printing; additive fabrication; digital fabrication; rapid prototyping.

Unsupervised Personality Recognition for Social Network Sites
Fabio Celli
keywords: Social Network Sites; Personality Recognition; Information Extraction; Natural Language Processing

Cellular Automata: Simulations Using Matlab
Stavros Athanassopoulos, Christos Kaklamanis, Gerasimos Kalfoutzos, and Evi Papaioannou
keywords: cellular automata; simulation; Matlab

Fast Polynomial Approximation Acceleration on the GPU
Lumír Janošek and Martin Němec
keywords: GPU; CUDA; Direct Memory Access; Parallel Reduction; Approximation

Generating Context-aware Recommendations using Banking Data in a Mobile Recommender System
Daniel Gallego Vico, Gabriel Huecas, and Joaquín Salvachúa Rodríguez
keywords: Mobile Recommender; Context-aware; Banking data mining; User modeling; Customer segmentation

Web Personalization; Implications and Challenges
Ahmad Kardan and Amirhossein Roshanzamir
keywords: web personalization; build-to-order; customer relationship management; recommender system; frequent flyer program.

New Service Development Method for Prosumer Environments
Ramon Alcarria, Tomás Robles, Augusto Morales, and Sergio González-Miranda
keywords: new service development; co-creation; service composition; service customization; QFD

Digital Investigations for Enterprise Information Architectures
Syed Naqvi, Gautier Dallons, and Christophe Ponsard
keywords: digital forensics analysis, ICT security architecture, enterprise information architecture

Shadow IT - Management and Control of Unofficial IT
Christopher Rentrop and Stephan Zimmermann
keywords: Shadow IT; IT Controlling; IT Governance; IT Service Management

A Secure and Distributed Infrastructure for Health Record Access
Victoriano Giralt
keywords: health record; security; accountability; Federated Identity and Access Management.

Active Mechanisms for Cloud Environments
Irina Astrova, Arne Koschel, Stella Gatziu Grivas, Marc Schaaf, Ilja Hellwich, Sven Kasten, Nedim Vaizovic, and Christoph Wiens
keywords: Cloud computing; events; active mechanisms

Information Technology Planning For Collaborative Product Development Through Fuzzy QFD
Jbid Arsenyan and Gülçin Büyüközkan
keywords: Collaborative Product Development; Fuzzy QFD; Technology requirements

Indoor IEEE 802.11g Radio Coverage Study
Sandra Sendra, Laura Ferrando, Jaime Lloret, and Alejando Canovas
keywords: radio coverage; indoor study, WLAN; IEEE 802.11g.

Security Issues of WiMAX Networks with High Altitude Platforms
Ilija Basicevic and Miroslav Popovic
keywords: high altitude platforms; IEEE 802.16; intrusion detection system; network security

Alteration Method of Schedule Information on Public Cloud
Tatsuya Miyagami, Atsushi Kanai, Noriaki Saito, Shigeaki Tanimoto, and Hiroyuki Sato
keywords: cloud computing; Internet security; privacy; Google Calendar; schedule service; date alteration.

Identifying Potentially Useful Email Header Features for Email Spam Filtering
Omar Al-Jarrah, Ismail Khater, and Basheer Al-Duwairi
keywords: Email spam, Machine Learning

Fault Tolerant Distributed Embedded Architecture and Verification
Chandrasekaran Subramaniam, Prasanna Vetrivel, Srinath Badri, and Sriram Badri
keywords: Distributed architecture; Fault tolerance; Security module; Model verification; Assertion technique.

Determining Authentication Strength for Smart Card-based Authentication Use Cases
Ramaswamy Chandramouli
keywords: Identity Verification, Smart Identity Token, Authentication Strength