Intro; Preface; Contents; List of Abbreviations; Chapter 1: Being Human in the Digital Age; 1.1 ... 1984 Won't Be Like "1984"?; Chapter 2: Netizens, Communities, e-Citizens Being Human in the Digital Age; 2.1 Introduction; 2.2 ICT as a Driver of Change; 2.3 From Punched Cards to Pads; 2.4 From ``Vision ́́to Reality; 2.5 Evolution of Communication in Pills; 2.6 e-Citizens: The ``Mobile ́́Generation; 2.7 Re-shaping the Market: The Power of Platforms; 2.8 Social Media: Opportunities and Threats; References; Chapter 3: Well-Being in the Digital Age; 3.1 Introduction
Text of Note
3.2 Well-Being: Definitions and Indicators3.3 e-Government: The Citizen as a User; 3.4 Open Government: The Search for the ``Happy Citizen;́́ 3.5 From Digital Cities to Smart Cities; 3.6 Issy Les Moulineaux: A Smart City; 3.7 The Evolution of Smart Cities; 3.8 Identity, Multiculturalism, and Wellbeing; References; Chapter 4: Safety and Security; 4.1 Introduction; 4.2 Cyber and Safety; 4.2.1 Human Factors: Feeling Safe; 4.3 Some Examples of APPs and Affordable Devices; 4.4 Slow Onset Disasters; 4.5 Internet of Things, CCTV, Drones
Text of Note
4.12 Information and Data Stream Management4.13 Risk Assessment Approach; 4.14 Final Remarks; References; Encryption and User Identity; Cyber Laws, Cyber Crimes, Cyber Security; Chapter 5: Technologies and Privacy; 5.1 Introduction; 5.2 Ownership, Use, Abuse and Misuse; 5.3 Owning Information; 5.4 Data and Ownership; 5.5 Cyberspace is really a Black Hole?; 5.6 Internet ``Prosumers ́́Initiative: My Data Belongs to Me; 5.7 Laws and Regulations; 5.8 EU Data Protection Directive and Personal Data Re-use; 5.9 Responsibilities in Data Re-use; 5.10 The Role of Privacy and Risk Related to Breaches
Text of Note
4.5.1 Ethical and Moral Aspects in UAV and Artificial Intelligence4.6 A Culture of Safety and Security; 4.7 Cyber-Security, ``Mother ́́of ICTs and Security; 4.7.1 Hackers and Cybercriminals; 4.7.2 Cyber Warriors; 4.7.3 Cyber Laws and Regulations; 4.7.4 Most Common Attacks; Spamming; Spoofing; Phishing; Social Engineering; Social Engineering Can Be Broken Down into Four Sub-Groups; Intimidation; Helpfulness; Name-Dropping; Technical; Backdoors; Shibboleth; Malware; Brute-Force Attack; Password Cracking; Packet Analyser; Eavesdropping; Rootkit; Trojan Horses; Computer Viruses; Computer Worms
Text of Note
Keystroke Logging4.7.5 Tools and Procedures; Vulnerability Scanner and Port Scanners; Finding Vulnerabilities; 4.8 Data Protection; 4.8.1 Steganography; 4.8.2 Cryptography; 4.8.3 More About Cryptography; 4.8.4 Encryption in the Internet Era; 4.8.5 Secure Socket Layer (SSL); 4.8.6 Symmetric vs. Asymmetric Encryption; 4.8.7 Future of Encryption; 4.9 User Identity; 4.9.1 Credentials; 4.9.2 One Time Password; 4.9.3 Dynamic Passwords; 4.9.4 Biometrics; Fingerprints; Face Recognition; 4.10 Twenty-First Century Cyber Warfare; 4.10.1 What Do We Term ``War?́́; 4.11 Cyber Range
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an "e-Citizen" and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.