{"title":"Transparent authentication in E-learning","authors":"Nawfal F. Fadhel, G. Wills, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978465","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978465","url":null,"abstract":"In the context of on-line assessment in E-learning a problem arises is that someone taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam. This differs from authenticating for on-line banking where it is in the user interest to ensure safe and correct authentication. Our proposed solution is to digitally sign the student work by embedding voice samples in the exam paper at regular intervals. In this investigation we have demonstrated that transparent steganography can provide an effective mechanism for achieving such a good goal.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reengineering of a virtual library in science technology and innovation: Improvements on information access","authors":"D. Ucha, Fabiana Andrade Pereira","doi":"10.1109/I-SOCIETY18435.2011.5978437","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978437","url":null,"abstract":"Ensuring information access has become a critical issue in modern society. Information is considered nowadays one of the most valuable and strategic asset. Information access improvements aim to reduce the barrier between information creators and information seekers. Aligned to this definition, five improvements (Search Engine Optimization, Information Architecture, Usability, Accessibility and Social Media) were selected as a main guideline for VLs' information access upgrade, which are under development in FAPESP's VL.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using open-source tools for web crawling and indexing of open content","authors":"André Ricardo, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978485","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978485","url":null,"abstract":"The Internet has made possible the access to thousands of freely available music tracks under the Creative Commons or Public Domain licenses. This number keeps growing on a yearly basis. In practical terms, it is extremely difficult to browse this huge music collection, because it is widely dispersed throughout multiple websites. The work presented on this paper addresses the problem of indexing this large collection of free music. This is a very relevant problem because currently there are no integrated database or index holding information about this music material. Indexing this content will allow, for instance, the development of music recommendation systems that will also work with noncommercial content. In this paper the authors present a system proposal that has been developed to tackle the available free music indexing problem and how this system can be integrated with other systems (such as music recommendation systems) to allow the end users to enjoy free and open music content.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conflict-solving perspective on collaborative knowledge classification - Application of a non compensatory multicriteria model","authors":"I. Brigui-Chtioui, I. Saad","doi":"10.1109/I-SOCIETY18435.2011.5978500","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978500","url":null,"abstract":"In this paper we propose a non compensatory aggregation model based on two reference points: the aspiration point and the reservation point in order to automate the resolution of conflicts between decision makers for identifying knowledge that need to be capitalized. We follow a multi-agent system based on a mediator agent. This new approach allows to elicit preferences of decision makers which can be different while exploiting their multiple points of view to identify organizational knowledge to be acquired, preserved and transferred.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133598736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Anti-Phishing mechanism for single sign-on based on QR-code","authors":"Syamantak Mukhopadhyay, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978554","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978554","url":null,"abstract":"Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle & reply attacks.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric implementation in autonomous systems with an emphasis on smart home applicability","authors":"P. Matthew","doi":"10.1109/I-SOCIETY18435.2011.5978475","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978475","url":null,"abstract":"With an aging population and the increase in serious diseases smart homes and telehealth is becoming more and more prevalent. As these computer systems become increasingly widespread and complex, they become progressively harder to update, troubleshoot and configure without a large expert team of maintainers. One solution is to use autonomous systems to do the work much more quickly and efficiently. As autonomous systems become more sophisticated and understood, security concerns and authentication are coming to the fore as important areas in which more research is needed. With the constant search for the illusive ideal security identifier biometric systems have become more widespread and have entered the public eye. This paper will look at the connection between smart homes, biometrics devices and autonomous systems. into biometrics.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Essentials for the e-government security","authors":"F. Hadi, Fahad T. Bin Muhaya","doi":"10.1109/I-SOCIETY18435.2011.5978443","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978443","url":null,"abstract":"In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why the governments of today's world are transforming their manual government services to electronic government services frequently. In the meantime the entire digitization of the system is prone to various security issues. Clear steps must be taken to ensure the privacy, authentication, integrity, and availability etc. This paper outlines some essential measures related to the e-government security. It also adds the security index into the e-government assessment method of the Department of Economic and Social Affairs (ESA) of United Nations (UN). The security index is based upon the international standard ISO 27001. Authors believe that the paper is useful for the policy makers, implementers and users of the e-government.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCM — A simple, modular and flexible customer interaction management system","authors":"Jorg Schuster, Yeong Su Lee, Despina Kobothanassi, Matthias Bargel, Michaela Geierhos","doi":"10.1109/I-SOCIETY18435.2011.5978528","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978528","url":null,"abstract":"SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/…? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open access movement in science and research","authors":"Małgorzata Pańkowska","doi":"10.1109/I-SOCIETY18435.2011.5978464","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978464","url":null,"abstract":"The paper covers considerations on open access movement for science and research development. The first part includes discussions on what an open access is, next the business model of open access publishing is presented. The third subchapter comprises the review of open access solutions developed at 20 universities around the world. In conclusion open access movement is interpreted as socio-economic problem, rather than strictly technical solution.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113935638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding eInclusion gaps across European regions: A benchmarking analysis","authors":"E. Pautasso, E. Ferro, E. Raguseo","doi":"10.1109/I-SOCIETY18435.2011.5978453","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978453","url":null,"abstract":"This paper analyses digital divide in an Italian region (Piedmont) exploring factors that determine Internet usage by citizens. The research is conducted by using data collected over time by the Piedmont ICT Observatory (PICTO) through a survey on a sample of 2,000 citizens and then comparing them with Eurostat data. Focusing on Piedmont data, multivariate analysis shows that age and education level are the two most important variables that influence Internet usage. Moreover comparing Piedmont with similar European regions, this research has found out that the value reached by Piedmont is not enough high and that this is due to the ageing of Piedmont population and to its lower educational level, confirming the findings of the first part of the study. Thus, the analysis of e-inclusion policies implemented in such regions aimed to bridge this gap and addressed to the part of the population that has been identified as excluded, would help the policy maker to better understand which actions could be undertaken to increase the number of Internet users in the region.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115847788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}