callback( { "result":{ "query":":facetid:stream:\"streams/conf/hcc\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"232.55" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"333", "@dc":"333", "@oc":"333", "@id":"43359969", "text":":facetid:stream:streams/conf/hcc" } }, "hits":{ "@total":"333", "@computed":"333", "@sent":"333", "@first":"0", "hit":[{ "@score":"1", "@id":"841450", "info":{"authors":{"author":[{"@pid":"333/9451","text":"Barbara Nino Carreras"},{"@pid":"66/4199","text":"Sisse Finken"}]},"title":"Autonomy Alliances and Data Care Practices.","venue":"HCC","pages":"47-57","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/CarrerasF22","doi":"10.1007/978-3-031-15688-5_5","ee":"https://doi.org/10.1007/978-3-031-15688-5_5","url":"https://dblp.org/rec/conf/hcc/CarrerasF22"}, "url":"URL#841450" }, { "@score":"1", "@id":"841451", "info":{"authors":{"author":[{"@pid":"333/8687","text":"Casper Chigwedere"},{"@pid":"122/1392","text":"Sam Takavarasha"},{"@pid":"333/9341","text":"Bonface Chisaka"}]},"title":"Regulatory Frameworks in Developing Countries: An Integrative Literature Review.","venue":"HCC","pages":"170-185","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ChigwedereTC22","doi":"10.1007/978-3-031-15688-5_15","ee":"https://doi.org/10.1007/978-3-031-15688-5_15","url":"https://dblp.org/rec/conf/hcc/ChigwedereTC22"}, "url":"URL#841451" }, { "@score":"1", "@id":"841452", "info":{"authors":{"author":{"@pid":"333/8639","text":"Tetsunosuke Jinnai"}},"title":"Application of International Law to Cyber Conflicts Outline of Japan's Legal Response Against Low-Intensity Cyber Conflicts Through Countermeasures.","venue":"HCC","pages":"186-199","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Jinnai22","doi":"10.1007/978-3-031-15688-5_16","ee":"https://doi.org/10.1007/978-3-031-15688-5_16","url":"https://dblp.org/rec/conf/hcc/Jinnai22"}, "url":"URL#841452" }, { "@score":"1", "@id":"841453", "info":{"authors":{"author":[{"@pid":"152/4195","text":"Jay Kishigami"},{"@pid":"224/9632","text":"Shigenori Ohashi"},{"@pid":"333/9794","text":"Noritaka Maeda"},{"@pid":"45/4212-2","text":"Shigeru Fujimura 0002"},{"@pid":"189/1377","text":"Atsushi Nakadaira"}]},"title":"An Analysis Between SNS and Social Capital Types in Japan.","venue":"HCC","pages":"58-66","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KishigamiOM0N22","doi":"10.1007/978-3-031-15688-5_6","ee":"https://doi.org/10.1007/978-3-031-15688-5_6","url":"https://dblp.org/rec/conf/hcc/KishigamiOM0N22"}, "url":"URL#841453" }, { "@score":"1", "@id":"841454", "info":{"authors":{"author":{"@pid":"184/7928","text":"Taro Komukai"}},"title":"Privacy Protection During Criminal Investigations of Personal Data Held by Third Parties.","venue":"HCC","pages":"200-212","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Komukai22","doi":"10.1007/978-3-031-15688-5_17","ee":"https://doi.org/10.1007/978-3-031-15688-5_17","url":"https://dblp.org/rec/conf/hcc/Komukai22"}, "url":"URL#841454" }, { "@score":"1", "@id":"841455", "info":{"authors":{"author":{"@pid":"146/9759","text":"Toru Maruhashi"}},"title":"General Monitoring and Constructive Knowledge? Issues of Automated Content Moderation by Hosting Service Providers Under Japanese Law.","venue":"HCC","pages":"144-158","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Maruhashi22","doi":"10.1007/978-3-031-15688-5_13","ee":"https://doi.org/10.1007/978-3-031-15688-5_13","url":"https://dblp.org/rec/conf/hcc/Maruhashi22"}, "url":"URL#841455" }, { "@score":"1", "@id":"841456", "info":{"authors":{"author":{"@pid":"278/5334","text":"Mika Nakashima"}},"title":"Comparison of Legal Systems for Data Portability in the EU, the US and Japan and the Direction of Legislation in Japan.","venue":"HCC","pages":"159-169","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Nakashima22","doi":"10.1007/978-3-031-15688-5_14","ee":"https://doi.org/10.1007/978-3-031-15688-5_14","url":"https://dblp.org/rec/conf/hcc/Nakashima22"}, "url":"URL#841456" }, { "@score":"1", "@id":"841457", "info":{"authors":{"author":{"@pid":"231/3069","text":"Aimi Ozaki"}},"title":"The Use of Live Facial Recognition Technology by Private Entities in Public Places: A Study of Recent Case in Japan.","venue":"HCC","pages":"27-35","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Ozaki22","doi":"10.1007/978-3-031-15688-5_3","ee":"https://doi.org/10.1007/978-3-031-15688-5_3","url":"https://dblp.org/rec/conf/hcc/Ozaki22"}, "url":"URL#841457" }, { "@score":"1", "@id":"841458", "info":{"authors":{"author":[{"@pid":"333/9991","text":"Salla Ponkala"},{"@pid":"148/8682","text":"Jani Koskinen"},{"@pid":"333/8867","text":"Camilla Lähteenmäki"},{"@pid":"88/2417","text":"Antti Tuomisto"}]},"title":"Promoting Worker Wellbeing in the Era of Data Economy.","venue":"HCC","pages":"3-17","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PonkalaKLT22","doi":"10.1007/978-3-031-15688-5_1","ee":"https://doi.org/10.1007/978-3-031-15688-5_1","url":"https://dblp.org/rec/conf/hcc/PonkalaKLT22"}, "url":"URL#841458" }, { "@score":"1", "@id":"841459", "info":{"authors":{"author":[{"@pid":"334/0023","text":"Ayuki Saito"},{"@pid":"278/4837","text":"Michele Baccelli"},{"@pid":"99/3206","text":"Kazuto Kobayashi"},{"@pid":"278/4654","text":"Mitsuyoshi Hiratsuka"}]},"title":"A Study on AI Creations and Patent Law Protection.","venue":"HCC","pages":"132-143","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SaitoBKH22","doi":"10.1007/978-3-031-15688-5_12","ee":"https://doi.org/10.1007/978-3-031-15688-5_12","url":"https://dblp.org/rec/conf/hcc/SaitoBKH22"}, "url":"URL#841459" }, { "@score":"1", "@id":"841460", "info":{"authors":{"author":[{"@pid":"52/8855","text":"Johanna Sefyrin"},{"@pid":"147/2013","text":"Mariana S. Gustafsson"}]},"title":"Repair of Unstable Sociomaterial Relations: A Study on Librarians' and Social Workers' Practices in Addressing the Needs of Their Clients.","venue":"HCC","pages":"36-46","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SefyrinG22","doi":"10.1007/978-3-031-15688-5_4","ee":"https://doi.org/10.1007/978-3-031-15688-5_4","url":"https://dblp.org/rec/conf/hcc/SefyrinG22"}, "url":"URL#841460" }, { "@score":"1", "@id":"841461", "info":{"authors":{"author":{"@pid":"333/9419","text":"Mayu Terada"}},"title":"Possible Utilization of Personal Data and Medical Care in Japan, Focusing on Japan's Act on Anonymously Processed Medical Information to Contribute to Medical Research and Development.","venue":"HCC","pages":"67-85","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Terada22","doi":"10.1007/978-3-031-15688-5_7","ee":"https://doi.org/10.1007/978-3-031-15688-5_7","url":"https://dblp.org/rec/conf/hcc/Terada22"}, "url":"URL#841461" }, { "@score":"1", "@id":"841462", "info":{"authors":{"author":[{"@pid":"238/5192","text":"Mikko Vermanen"},{"@pid":"148/8680","text":"Minna M. Rantanen"},{"@pid":"148/8682","text":"Jani Koskinen"}]},"title":"Privacy in Internet of Things Ecosystems - Prerequisite for the Ethical Data Collection and Use by Companies.","venue":"HCC","pages":"18-26","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VermanenRK22","doi":"10.1007/978-3-031-15688-5_2","ee":"https://doi.org/10.1007/978-3-031-15688-5_2","url":"https://dblp.org/rec/conf/hcc/VermanenRK22"}, "url":"URL#841462" }, { "@score":"1", "@id":"841463", "info":{"authors":{"author":[{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"04/863","text":"Louise Leenen"},{"@pid":"278/4663","text":"Anna-Marie Jansen van Vuuren"}]},"title":"Don't be Caught Unaware: A Ransomware Primer with a Specific Focus on Africa.","venue":"HCC","pages":"115-131","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VuurenLV22","doi":"10.1007/978-3-031-15688-5_11","ee":"https://doi.org/10.1007/978-3-031-15688-5_11","url":"https://dblp.org/rec/conf/hcc/VuurenLV22"}, "url":"URL#841463" }, { "@score":"1", "@id":"841464", "info":{"authors":{"author":[{"@pid":"333/8614","text":"Ryuta Yamashita"},{"@pid":"37/8537","text":"Tadaaki Shimizu"},{"@pid":"334/0124","text":"Natsuki Yoshinaka"},{"@pid":"333/9428","text":"Rintaro Kataoka"},{"@pid":"70/2093","text":"Naoki Sawada"}]},"title":"Examining the Effective of Web Advertising on Pupil Size.","venue":"HCC","pages":"86-99","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/YamashitaSYKS22","doi":"10.1007/978-3-031-15688-5_8","ee":"https://doi.org/10.1007/978-3-031-15688-5_8","url":"https://dblp.org/rec/conf/hcc/YamashitaSYKS22"}, "url":"URL#841464" }, { "@score":"1", "@id":"841465", "info":{"authors":{"author":[{"@pid":"247/3005","text":"Markus Philipp Zimmer"},{"@pid":"53/6729","text":"Jonna Järveläinen"}]},"title":"Digital-Sustainable Co-transformation: Introducing the Triple Bottom Line of Sustainability to Digital Transformation Research.","venue":"HCC","pages":"100-111","year":"2022","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ZimmerJ22","doi":"10.1007/978-3-031-15688-5_10","ee":"https://doi.org/10.1007/978-3-031-15688-5_10","url":"https://dblp.org/rec/conf/hcc/ZimmerJ22"}, "url":"URL#841465" }, { "@score":"1", "@id":"955337", "info":{"authors":{"author":[{"@pid":"77/711","text":"David Kreps"},{"@pid":"d/RobertMDavison","text":"Robert M. Davison"},{"@pid":"184/7928","text":"Taro Komukai"},{"@pid":"184/7921","text":"Kaori Ishii"}]},"title":"Human Choice and Digital by Default: Autonomy vs Digital Determination - 15th IFIP International Conference on Human Choice and Computers, HCC 2022, Tokyo, Japan, September 8-9, 2022, Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"656","publisher":"Springer","year":"2022","type":"Editorship","key":"conf/hcc/2022","doi":"10.1007/978-3-031-15688-5","ee":"https://doi.org/10.1007/978-3-031-15688-5","url":"https://dblp.org/rec/conf/hcc/2022"}, "url":"URL#955337" }, { "@score":"1", "@id":"1751837", "info":{"authors":{"author":[{"@pid":"278/4837","text":"Michele Baccelli"},{"@pid":"99/3206","text":"Kazuto Kobayashi"},{"@pid":"278/5178","text":"Steven C. Sereboff"},{"@pid":"278/4654","text":"Mitsuyoshi Hiratsuka"}]},"title":"Advanced Software and Patents: A Patentability Balance for Fostering Technology.","venue":"HCC","pages":"64-76","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/BaccelliKSH20","doi":"10.1007/978-3-030-62803-1_6","ee":"https://doi.org/10.1007/978-3-030-62803-1_6","url":"https://dblp.org/rec/conf/hcc/BaccelliKSH20"}, "url":"URL#1751837" }, { "@score":"1", "@id":"1751838", "info":{"authors":{"author":{"@pid":"231/3075","text":"Kathrin Bednar"}},"title":"Exploring Human Nature in a Technology-Driven Society.","venue":"HCC","pages":"281-290","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Bednar20","doi":"10.1007/978-3-030-62803-1_22","ee":"https://doi.org/10.1007/978-3-030-62803-1_22","url":"https://dblp.org/rec/conf/hcc/Bednar20"}, "url":"URL#1751838" }, { "@score":"1", "@id":"1751839", "info":{"authors":{"author":[{"@pid":"191/0294","text":"Arno de Coning"},{"@pid":"39/10872","text":"Francois Mouton"}]},"title":"Data Processing Automation for Bulk Water Supply Monitoring.","venue":"HCC","pages":"193-202","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ConingM20","doi":"10.1007/978-3-030-62803-1_16","ee":"https://doi.org/10.1007/978-3-030-62803-1_16","url":"https://dblp.org/rec/conf/hcc/ConingM20"}, "url":"URL#1751839" }, { "@score":"1", "@id":"1751840", "info":{"authors":{"author":[{"@pid":"132/0897","text":"Matthew J. Davis"},{"@pid":"148/8729","text":"Per Fors"}]},"title":"Towards a Typology of Intentionally Inaccurate Representations of Reality in Media Content.","venue":"HCC","pages":"291-304","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/DavisF20","doi":"10.1007/978-3-030-62803-1_23","ee":"https://doi.org/10.1007/978-3-030-62803-1_23","url":"https://dblp.org/rec/conf/hcc/DavisF20"}, "url":"URL#1751840" }, { "@score":"1", "@id":"1751841", "info":{"authors":{"author":[{"@pid":"206/9747","text":"Vassilis Galanos"},{"@pid":"278/5325","text":"Mary Reisel"}]},"title":"Assessing the Japanese Turn in AI and Robot Ethics: Extracting Meaningful Principles Between Exoticism and Empiricism in the Case of AIBO.","venue":"HCC","pages":"141-157","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/GalanosR20","doi":"10.1007/978-3-030-62803-1_12","ee":"https://doi.org/10.1007/978-3-030-62803-1_12","url":"https://dblp.org/rec/conf/hcc/GalanosR20"}, "url":"URL#1751841" }, { "@score":"1", "@id":"1751842", "info":{"authors":{"author":[{"@pid":"242/4111","text":"Jenni Greig"},{"@pid":"219/5727","text":"Anwaar Ulhaq"},{"@pid":"236/0196","text":"Gregory Dresser"},{"@pid":"18/4457","text":"Oliver K. Burmeister"},{"@pid":"55/4130","text":"Sabih ur Rehman"}]},"title":"Intelligent Monitoring of Chronic Illness for the Ageing Rural Population: Opportunities and Cautions.","venue":"HCC","pages":"158-170","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/GreigUDBR20","doi":"10.1007/978-3-030-62803-1_13","ee":"https://doi.org/10.1007/978-3-030-62803-1_13","url":"https://dblp.org/rec/conf/hcc/GreigUDBR20"}, "url":"URL#1751842" }, { "@score":"1", "@id":"1751843", "info":{"authors":{"author":[{"@pid":"278/4857","text":"Dennis Grenda"},{"@pid":"131/9603","text":"Anne-Marie Tuikka"}]},"title":"The Relevance of Humans and Structure: Managerial and Organizational Challenges in Smart Factories.","venue":"HCC","pages":"171-180","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/GrendaT20","doi":"10.1007/978-3-030-62803-1_14","ee":"https://doi.org/10.1007/978-3-030-62803-1_14","url":"https://dblp.org/rec/conf/hcc/GrendaT20"}, "url":"URL#1751843" }, { "@score":"1", "@id":"1751844", "info":{"authors":{"author":[{"@pid":"84/11536","text":"Olli I. Heimo"},{"@pid":"53/4255","text":"Kai K. Kimppa"}]},"title":"Public Fora and Freedom of Expression.","venue":"HCC","pages":"340-350","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HeimoK20","doi":"10.1007/978-3-030-62803-1_27","ee":"https://doi.org/10.1007/978-3-030-62803-1_27","url":"https://dblp.org/rec/conf/hcc/HeimoK20"}, "url":"URL#1751844" }, { "@score":"1", "@id":"1751845", "info":{"authors":{"author":{"@pid":"184/7921","text":"Kaori Ishii"}},"title":"A Study on Abusing Superior Bargaining Position in the Anti-Monopoly Act and Its Relation to the Act on the Protection of Personal Information in Japan.","venue":"HCC","pages":"5-15","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Ishii20","doi":"10.1007/978-3-030-62803-1_1","ee":"https://doi.org/10.1007/978-3-030-62803-1_1","url":"https://dblp.org/rec/conf/hcc/Ishii20"}, "url":"URL#1751845" }, { "@score":"1", "@id":"1751846", "info":{"authors":{"author":[{"@pid":"99/3206","text":"Kazuto Kobayashi"},{"@pid":"278/4654","text":"Mitsuyoshi Hiratsuka"},{"@pid":"278/4837","text":"Michele Baccelli"}]},"title":"IPR Risk Assessment of Companies Implementing Standard Essential Patents and Validation.","venue":"HCC","pages":"77-85","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KobayashiHB20","doi":"10.1007/978-3-030-62803-1_7","ee":"https://doi.org/10.1007/978-3-030-62803-1_7","url":"https://dblp.org/rec/conf/hcc/KobayashiHB20"}, "url":"URL#1751846" }, { "@score":"1", "@id":"1751847", "info":{"authors":{"author":{"@pid":"53/4023","text":"Hiroshi Koga"}},"title":"Social Materiality of Smartphone Game Apps - Case Analysis of Pokémon GO.","venue":"HCC","pages":"315-322","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Koga20","doi":"10.1007/978-3-030-62803-1_25","ee":"https://doi.org/10.1007/978-3-030-62803-1_25","url":"https://dblp.org/rec/conf/hcc/Koga20"}, "url":"URL#1751847" }, { "@score":"1", "@id":"1751848", "info":{"authors":{"author":{"@pid":"220/2588","text":"Yusuke Kurihara"}},"title":"Self-Sovereign Identity and Blockchain-Based Content Management.","venue":"HCC","pages":"130-140","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Kurihara20","doi":"10.1007/978-3-030-62803-1_11","ee":"https://doi.org/10.1007/978-3-030-62803-1_11","url":"https://dblp.org/rec/conf/hcc/Kurihara20"}, "url":"URL#1751848" }, { "@score":"1", "@id":"1751849", "info":{"authors":{"author":[{"@pid":"264/7649","text":"Cæcilie Sloth Laursen"},{"@pid":"66/4199","text":"Sisse Finken"}]},"title":"Silent Data, Active Patients.","venue":"HCC","pages":"398-408","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/LaursenF20","doi":"10.1007/978-3-030-62803-1_31","ee":"https://doi.org/10.1007/978-3-030-62803-1_31","url":"https://dblp.org/rec/conf/hcc/LaursenF20"}, "url":"URL#1751849" }, { "@score":"1", "@id":"1751850", "info":{"authors":{"author":[{"@pid":"04/863","text":"Louise Leenen"},{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"278/4663","text":"Anna-Marie Jansen van Vuuren"}]},"title":"Cybersecurity and Cybercrime Combatting Culture for African Police Services.","venue":"HCC","pages":"248-261","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/LeenenVV20","doi":"10.1007/978-3-030-62803-1_20","ee":"https://doi.org/10.1007/978-3-030-62803-1_20","url":"https://dblp.org/rec/conf/hcc/LeenenVV20"}, "url":"URL#1751850" }, { "@score":"1", "@id":"1751851", "info":{"authors":{"author":{"@pid":"146/9759","text":"Toru Maruhashi"}},"title":"Japan-EU Passenger Name Record Negotiations and Their Implications.","venue":"HCC","pages":"100-114","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Maruhashi20","doi":"10.1007/978-3-030-62803-1_9","ee":"https://doi.org/10.1007/978-3-030-62803-1_9","url":"https://dblp.org/rec/conf/hcc/Maruhashi20"}, "url":"URL#1751851" }, { "@score":"1", "@id":"1751852", "info":{"authors":{"author":[{"@pid":"69/9188","text":"Brad McKenna"},{"@pid":"160/3082","text":"Lena Waizenegger"},{"@pid":"54/4617","text":"Wenjie Cai"}]},"title":"The Influence of Personal and Professional Commitments on Digitally Disconnected Experiences.","venue":"HCC","pages":"305-314","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/McKennaWC20","doi":"10.1007/978-3-030-62803-1_24","ee":"https://doi.org/10.1007/978-3-030-62803-1_24","url":"https://dblp.org/rec/conf/hcc/McKennaWC20"}, "url":"URL#1751852" }, { "@score":"1", "@id":"1751853", "info":{"authors":{"author":{"@pid":"278/4711","text":"Lena Mischau"}},"title":"The Laws of Big Data - How Data Protection Law, Competition Law and Contract Law Deal with the Challenges of a Data-Driven World.","venue":"HCC","pages":"16-28","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Mischau20","doi":"10.1007/978-3-030-62803-1_2","ee":"https://doi.org/10.1007/978-3-030-62803-1_2","url":"https://dblp.org/rec/conf/hcc/Mischau20"}, "url":"URL#1751853" }, { "@score":"1", "@id":"1751854", "info":{"authors":{"author":{"@pid":"278/4972","text":"Tomoko Nagasako"}},"title":"A Consideration of the Case Study of Disinformation and Its Legal Problems.","venue":"HCC","pages":"262-276","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Nagasako20","doi":"10.1007/978-3-030-62803-1_21","ee":"https://doi.org/10.1007/978-3-030-62803-1_21","url":"https://dblp.org/rec/conf/hcc/Nagasako20"}, "url":"URL#1751854" }, { "@score":"1", "@id":"1751855", "info":{"authors":{"author":{"@pid":"68/156","text":"Mariko Nakamura"}},"title":"Examining the Possibility of Expanding the Use of Digital Images Recorded in the "Audio-Visual Recording of Custodial Interrogation" System.","venue":"HCC","pages":"41-51","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Nakamura20","doi":"10.1007/978-3-030-62803-1_4","ee":"https://doi.org/10.1007/978-3-030-62803-1_4","url":"https://dblp.org/rec/conf/hcc/Nakamura20"}, "url":"URL#1751855" }, { "@score":"1", "@id":"1751856", "info":{"authors":{"author":{"@pid":"278/5334","text":"Mika Nakashima"}},"title":"The Legal Frameworks of the Right to Request the Deletion of Personal Data in the EU, the U.S. and Japan and the Right to Be Forgotten: A Study Focusing on Search Businesses.","venue":"HCC","pages":"29-40","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Nakashima20","doi":"10.1007/978-3-030-62803-1_3","ee":"https://doi.org/10.1007/978-3-030-62803-1_3","url":"https://dblp.org/rec/conf/hcc/Nakashima20"}, "url":"URL#1751856" }, { "@score":"1", "@id":"1751857", "info":{"authors":{"author":[{"@pid":"90/10872","text":"Brett van Niekerk"},{"@pid":"278/4785","text":"Martina Jennifer Zucule De Barros"},{"@pid":"278/4622","text":"Trishana Ramluckan"}]},"title":"An Analysis of Twitter During the 2017 Zimbabwean Military Intervention.","venue":"HCC","pages":"233-247","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/NiekerkBR20","doi":"10.1007/978-3-030-62803-1_19","ee":"https://doi.org/10.1007/978-3-030-62803-1_19","url":"https://dblp.org/rec/conf/hcc/NiekerkBR20"}, "url":"URL#1751857" }, { "@score":"1", "@id":"1751858", "info":{"authors":{"author":{"@pid":"231/3069","text":"Aimi Ozaki"}},"title":"Governance Framework for Facial Recognition Systems in Japan.","venue":"HCC","pages":"52-63","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Ozaki20","doi":"10.1007/978-3-030-62803-1_5","ee":"https://doi.org/10.1007/978-3-030-62803-1_5","url":"https://dblp.org/rec/conf/hcc/Ozaki20"}, "url":"URL#1751858" }, { "@score":"1", "@id":"1751859", "info":{"authors":{"author":[{"@pid":"148/8680","text":"Minna M. Rantanen"},{"@pid":"148/8682","text":"Jani Koskinen"}]},"title":"Humans of the European Data Economy Ecosystem - What Do They Demand from a Fair Data Economy?","venue":"HCC","pages":"327-339","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/RantanenK20","doi":"10.1007/978-3-030-62803-1_26","ee":"https://doi.org/10.1007/978-3-030-62803-1_26","url":"https://dblp.org/rec/conf/hcc/RantanenK20"}, "url":"URL#1751859" }, { "@score":"1", "@id":"1751860", "info":{"authors":{"author":[{"@pid":"278/4707","text":"Aki Shima"},{"@pid":"65/2951","text":"Tokuyasu Kakuta"}]},"title":"Qualitative Analysis of Interviews with Municipal Officers Toward the Human-Centered Improvement of the eLen Regulation Database System.","venue":"HCC","pages":"86-99","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ShimaK20","doi":"10.1007/978-3-030-62803-1_8","ee":"https://doi.org/10.1007/978-3-030-62803-1_8","url":"https://dblp.org/rec/conf/hcc/ShimaK20"}, "url":"URL#1751860" }, { "@score":"1", "@id":"1751861", "info":{"authors":{"author":[{"@pid":"278/4891","text":"Morten Simonsen"},{"@pid":"37/11536","text":"Hilde G. Corneliussen"}]},"title":"What Can Statistics Tell About the Gender Gap in ICT? Tracing Men and Women's Participation in the ICT Sector Through Numbers.","venue":"HCC","pages":"379-397","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SimonsenC20","doi":"10.1007/978-3-030-62803-1_30","ee":"https://doi.org/10.1007/978-3-030-62803-1_30","url":"https://dblp.org/rec/conf/hcc/SimonsenC20"}, "url":"URL#1751861" }, { "@score":"1", "@id":"1751862", "info":{"authors":{"author":[{"@pid":"278/5301","text":"Shivam Kumar Singh"},{"@pid":"40/4491","text":"Sujit Kumar Chakrabarti"},{"@pid":"39/1552","text":"Dinesh Babu Jayagopi"}]},"title":"Automated Testing of Refreshable Braille Display.","venue":"HCC","pages":"181-192","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SinghCJ20","doi":"10.1007/978-3-030-62803-1_15","ee":"https://doi.org/10.1007/978-3-030-62803-1_15","url":"https://dblp.org/rec/conf/hcc/SinghCJ20"}, "url":"URL#1751862" }, { "@score":"1", "@id":"1751863", "info":{"authors":{"author":[{"@pid":"43/3389","text":"Elena Vildjiounaite"},{"@pid":"98/7933","text":"Johanna Kallio"},{"@pid":"50/4727","text":"Julia Kantorovitch"},{"@pid":"80/254","text":"Vesa Kyllönen"},{"@pid":"252/2184","text":"Pauli Räsänen"},{"@pid":"97/2963","text":"Jussi Ronkainen"}]},"title":"Towards Social Enterprise with Internet of Office Desks.","venue":"HCC","pages":"361-374","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VildjiounaiteKK20","doi":"10.1007/978-3-030-62803-1_29","ee":"https://doi.org/10.1007/978-3-030-62803-1_29","url":"https://dblp.org/rec/conf/hcc/VildjiounaiteKK20"}, "url":"URL#1751863" }, { "@score":"1", "@id":"1751864", "info":{"authors":{"author":[{"@pid":"40/10952","text":"Jukka Vuorinen"},{"@pid":"244/3844","text":"Harley Bergroth"}]},"title":"Self-tracking, Power, and the Transition from Discipline to Control.","venue":"HCC","pages":"351-360","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VuorinenB20","doi":"10.1007/978-3-030-62803-1_28","ee":"https://doi.org/10.1007/978-3-030-62803-1_28","url":"https://dblp.org/rec/conf/hcc/VuorinenB20"}, "url":"URL#1751864" }, { "@score":"1", "@id":"1751865", "info":{"authors":{"author":{"@pid":"w/MartinWarnke","text":"Martin Warnke"}},"title":"Heaven and Earth - Cloud and Territory in the Internet.","venue":"HCC","pages":"117-129","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Warnke20","doi":"10.1007/978-3-030-62803-1_10","ee":"https://doi.org/10.1007/978-3-030-62803-1_10","url":"https://dblp.org/rec/conf/hcc/Warnke20"}, "url":"URL#1751865" }, { "@score":"1", "@id":"1751866", "info":{"authors":{"author":{"@pid":"278/5238","text":"Seiko Watanabe"}},"title":"States' Capacity Building for Cybersecurity: An IR Approach.","venue":"HCC","pages":"222-232","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Watanabe20","doi":"10.1007/978-3-030-62803-1_18","ee":"https://doi.org/10.1007/978-3-030-62803-1_18","url":"https://dblp.org/rec/conf/hcc/Watanabe20"}, "url":"URL#1751866" }, { "@score":"1", "@id":"1751867", "info":{"authors":{"author":[{"@pid":"181/7332","text":"Carien Van 't Wout"},{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"278/4663","text":"Anna-Marie Jansen van Vuuren"}]},"title":"Using Cyber Applications Towards Positive Psychology Interventions in Africa.","venue":"HCC","pages":"207-221","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/WoutVV20","doi":"10.1007/978-3-030-62803-1_17","ee":"https://doi.org/10.1007/978-3-030-62803-1_17","url":"https://dblp.org/rec/conf/hcc/WoutVV20"}, "url":"URL#1751867" }, { "@score":"1", "@id":"1862771", "info":{"authors":{"author":[{"@pid":"77/711","text":"David Kreps"},{"@pid":"184/7928","text":"Taro Komukai"},{"@pid":"37/2098","text":"T. V. Gopal"},{"@pid":"184/7921","text":"Kaori Ishii"}]},"title":"Human-Centric Computing in a Data-Driven Society - 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, Tokyo, Japan, September 9-11, 2020, Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"590","publisher":"Springer","year":"2020","type":"Editorship","key":"conf/hcc/2020","doi":"10.1007/978-3-030-62803-1","ee":"https://doi.org/10.1007/978-3-030-62803-1","url":"https://dblp.org/rec/conf/hcc/2020"}, "url":"URL#1862771" }, { "@score":"1", "@id":"2568953", "info":{"authors":{"author":[{"@pid":"134/0152","text":"Nadia Ambrosetti"},{"@pid":"77/4860","text":"Matteo Cantamesse"}]},"title":"The Basic Dream of the PC, or "Did You Ever Play Tic-Tac-Toe"?","venue":"HCC","pages":"3-15","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/AmbrosettiC18","doi":"10.1007/978-3-319-99605-9_1","ee":"https://doi.org/10.1007/978-3-319-99605-9_1","url":"https://dblp.org/rec/conf/hcc/AmbrosettiC18"}, "url":"URL#2568953" }, { "@score":"1", "@id":"2568954", "info":{"authors":{"author":[{"@pid":"231/3075","text":"Kathrin Bednar"},{"@pid":"s/SarahSpiekermann","text":"Sarah Spiekermann"}]},"title":"Aware but not in Control - A Qualitative Value Analysis of the Effects of New Technologies.","venue":"HCC","pages":"202-218","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/BednarS18","doi":"10.1007/978-3-319-99605-9_15","ee":"https://doi.org/10.1007/978-3-319-99605-9_15","url":"https://dblp.org/rec/conf/hcc/BednarS18"}, "url":"URL#2568954" }, { "@score":"1", "@id":"2568955", "info":{"authors":{"author":[{"@pid":"31/3617","text":"Judy van Biljon"},{"@pid":"199/5817","text":"Filistéa Naudé"}]},"title":"Collaboration Towards a More Inclusive Society: The Case of South African ICT4D Researchers.","venue":"HCC","pages":"82-94","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/BiljonN18","doi":"10.1007/978-3-319-99605-9_6","ee":"https://doi.org/10.1007/978-3-319-99605-9_6","url":"https://dblp.org/rec/conf/hcc/BiljonN18"}, "url":"URL#2568955" }, { "@score":"1", "@id":"2568956", "info":{"authors":{"author":[{"@pid":"37/11536","text":"Hilde G. Corneliussen"},{"@pid":"176/4498","text":"Clem Herman"},{"@pid":"129/8594","text":"Radhika Gajjala"}]},"title":"ICT Changes Everything! But Who Changes ICT?","venue":"HCC","pages":"250-257","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/CorneliussenHG18","doi":"10.1007/978-3-319-99605-9_18","ee":"https://doi.org/10.1007/978-3-319-99605-9_18","url":"https://dblp.org/rec/conf/hcc/CorneliussenHG18"}, "url":"URL#2568956" }, { "@score":"1", "@id":"2568957", "info":{"authors":{"author":[{"@pid":"66/4199","text":"Sisse Finken"},{"@pid":"68/2362","text":"Christina Mörtberg"},{"@pid":"33/1776","text":"Pirjo Elovaara"}]},"title":"Becoming-with in Participatory Design.","venue":"HCC","pages":"258-268","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/FinkenME18","doi":"10.1007/978-3-319-99605-9_19","ee":"https://doi.org/10.1007/978-3-319-99605-9_19","url":"https://dblp.org/rec/conf/hcc/FinkenME18"}, "url":"URL#2568957" }, { "@score":"1", "@id":"2568958", "info":{"authors":{"author":{"@pid":"206/9747","text":"Vassilis Galanos"}},"title":"Artificial Intelligence Does Not Exist: Lessons from Shared Cognition and the Opposition to the Nature/Nurture Divide.","venue":"HCC","pages":"359-373","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Galanos18","doi":"10.1007/978-3-319-99605-9_27","ee":"https://doi.org/10.1007/978-3-319-99605-9_27","url":"https://dblp.org/rec/conf/hcc/Galanos18"}, "url":"URL#2568958" }, { "@score":"1", "@id":"2568959", "info":{"authors":{"author":[{"@pid":"84/11536","text":"Olli I. Heimo"},{"@pid":"148/8680","text":"Minna M. Rantanen"},{"@pid":"53/4255","text":"Kai K. Kimppa"}]},"title":"Three Views to a School Information System: Wilma from a Sociotechnical Perspective.","venue":"HCC","pages":"271-281","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HeimoRK18","doi":"10.1007/978-3-319-99605-9_20","ee":"https://doi.org/10.1007/978-3-319-99605-9_20","url":"https://dblp.org/rec/conf/hcc/HeimoRK18"}, "url":"URL#2568959" }, { "@score":"1", "@id":"2568960", "info":{"authors":{"author":[{"@pid":"231/3049","text":"Sytze Van Herck"},{"@pid":"215/5915","text":"Antonio Maria Fiscarelli"}]},"title":"Mind the Gap Gender and Computer Science Conferences.","venue":"HCC","pages":"232-249","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HerckF18","doi":"10.1007/978-3-319-99605-9_17","ee":"https://doi.org/10.1007/978-3-319-99605-9_17","url":"https://dblp.org/rec/conf/hcc/HerckF18"}, "url":"URL#2568960" }, { "@score":"1", "@id":"2568961", "info":{"authors":{"author":[{"@pid":"208/1302","text":"Sonja M. Hyrynsalmi"},{"@pid":"148/8680","text":"Minna M. Rantanen"},{"@pid":"75/10160","text":"Sami Hyrynsalmi"}]},"title":"Do We Have What Is Needed to Change Everything? - A Survey of Finnish Software Businesses on Labour Shortage and Its Potential Impacts.","venue":"HCC","pages":"111-122","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HyrynsalmiRH18","doi":"10.1007/978-3-319-99605-9_8","ee":"https://doi.org/10.1007/978-3-319-99605-9_8","url":"https://dblp.org/rec/conf/hcc/HyrynsalmiRH18"}, "url":"URL#2568961" }, { "@score":"1", "@id":"2568962", "info":{"authors":{"author":{"@pid":"184/7921","text":"Kaori Ishii"}},"title":"Discussions on the Right to Data Portability from Legal Perspectives.","venue":"HCC","pages":"338-355","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Ishii18","doi":"10.1007/978-3-319-99605-9_26","ee":"https://doi.org/10.1007/978-3-319-99605-9_26","url":"https://dblp.org/rec/conf/hcc/Ishii18"}, "url":"URL#2568962" }, { "@score":"1", "@id":"2568963", "info":{"authors":{"author":[{"@pid":"231/2978","text":"Ines Junge"},{"@pid":"53/3364","text":"Maja van der Velden"}]},"title":"Obsolescence in Information and Communication Technology: A Critical Discourse Analysis.","venue":"HCC","pages":"188-201","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/JungeV18","doi":"10.1007/978-3-319-99605-9_14","ee":"https://doi.org/10.1007/978-3-319-99605-9_14","url":"https://dblp.org/rec/conf/hcc/JungeV18"}, "url":"URL#2568963" }, { "@score":"1", "@id":"2568964", "info":{"authors":{"author":[{"@pid":"88/10395","text":"Miranda Kajtazi"},{"@pid":"60/10395","text":"Darek M. Haftor"}]},"title":"An Exploration of Opportunities for a Theory of Information Inadequacy.","venue":"HCC","pages":"384-394","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KajtaziH18","doi":"10.1007/978-3-319-99605-9_29","ee":"https://doi.org/10.1007/978-3-319-99605-9_29","url":"https://dblp.org/rec/conf/hcc/KajtaziH18"}, "url":"URL#2568964" }, { "@score":"1", "@id":"2568965", "info":{"authors":{"author":[{"@pid":"79/4826","text":"Iordanis Kavathatzopoulos"},{"@pid":"134/0237","text":"Ryoko Asai"}]},"title":"Philosophy as the Road to Good ICT.","venue":"HCC","pages":"293-298","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Kavathatzopoulos18","doi":"10.1007/978-3-319-99605-9_22","ee":"https://doi.org/10.1007/978-3-319-99605-9_22","url":"https://dblp.org/rec/conf/hcc/Kavathatzopoulos18"}, "url":"URL#2568965" }, { "@score":"1", "@id":"2568966", "info":{"authors":{"author":[{"@pid":"184/7928","text":"Taro Komukai"},{"@pid":"231/3069","text":"Aimi Ozaki"}]},"title":"The Legitimacy of Cross-Border Searches Through the Internet for Criminal Investigations.","venue":"HCC","pages":"329-337","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KomukaiO18","doi":"10.1007/978-3-319-99605-9_25","ee":"https://doi.org/10.1007/978-3-319-99605-9_25","url":"https://dblp.org/rec/conf/hcc/KomukaiO18"}, "url":"URL#2568966" }, { "@score":"1", "@id":"2568967", "info":{"authors":{"author":[{"@pid":"93/7840","text":"Kiyoshi Murata"},{"@pid":"62/7839","text":"Yohko Orito"},{"@pid":"198/3208","text":"Miha Takubo"}]},"title":"Do Honest People Pull the Short Straw? - The Paradox of Openness.","venue":"HCC","pages":"282-292","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/MurataOT18","doi":"10.1007/978-3-319-99605-9_21","ee":"https://doi.org/10.1007/978-3-319-99605-9_21","url":"https://dblp.org/rec/conf/hcc/MurataOT18"}, "url":"URL#2568967" }, { "@score":"1", "@id":"2568968", "info":{"authors":{"author":[{"@pid":"131/8498","text":"Tobias Nyström"},{"@pid":"48/9793","text":"Moyen Mohammad Mustaquim"}]},"title":"Exploring Sustainable HCI Research Dimensions Through the Inclusive Innovation Framework.","venue":"HCC","pages":"151-165","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/NystromM18","doi":"10.1007/978-3-319-99605-9_11","ee":"https://doi.org/10.1007/978-3-319-99605-9_11","url":"https://dblp.org/rec/conf/hcc/NystromM18"}, "url":"URL#2568968" }, { "@score":"1", "@id":"2568969", "info":{"authors":{"author":[{"@pid":"184/7949","text":"Parakum Pathirana"},{"@pid":"231/3046","text":"Conrad Dias"},{"@pid":"231/3033","text":"Thisan Samarasinghe"},{"@pid":"231/3085","text":"Shanmugarajah Sinnathamby"}]},"title":"iPay.lk - A Digital Merchant Platform from Sri Lanka.","venue":"HCC","pages":"95-110","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PathiranaDSS18","doi":"10.1007/978-3-319-99605-9_7","ee":"https://doi.org/10.1007/978-3-319-99605-9_7","url":"https://dblp.org/rec/conf/hcc/PathiranaDSS18"}, "url":"URL#2568969" }, { "@score":"1", "@id":"2568970", "info":{"authors":{"author":[{"@pid":"66/9246","text":"Norberto Patrignani"},{"@pid":"79/4826","text":"Iordanis Kavathatzopoulos"}]},"title":"On the Complex Relationship Between ICT Systems and the Planet.","venue":"HCC","pages":"181-187","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PatrignaniK18","doi":"10.1007/978-3-319-99605-9_13","ee":"https://doi.org/10.1007/978-3-319-99605-9_13","url":"https://dblp.org/rec/conf/hcc/PatrignaniK18"}, "url":"URL#2568970" }, { "@score":"1", "@id":"2568971", "info":{"authors":{"author":[{"@pid":"214/1502","text":"Adam Poulsen"},{"@pid":"18/4457","text":"Oliver K. Burmeister"},{"@pid":"77/711","text":"David Kreps"}]},"title":"The Ethics of Inherent Trust in Care Robots for the Elderly.","venue":"HCC","pages":"314-328","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PoulsenBK18","doi":"10.1007/978-3-319-99605-9_24","ee":"https://doi.org/10.1007/978-3-319-99605-9_24","url":"https://dblp.org/rec/conf/hcc/PoulsenBK18"}, "url":"URL#2568971" }, { "@score":"1", "@id":"2568972", "info":{"authors":{"author":{"@pid":"79/4740","text":"Ian Pyle"}},"title":"Software Engineering in a British Defence Project in 1970.","venue":"HCC","pages":"16-30","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Pyle18","doi":"10.1007/978-3-319-99605-9_2","ee":"https://doi.org/10.1007/978-3-319-99605-9_2","url":"https://dblp.org/rec/conf/hcc/Pyle18"}, "url":"URL#2568972" }, { "@score":"1", "@id":"2568973", "info":{"authors":{"author":[{"@pid":"148/8680","text":"Minna M. Rantanen"},{"@pid":"148/8682","text":"Jani Koskinen"}]},"title":"PHR, We've Had a Problem Here.","venue":"HCC","pages":"374-383","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/RantanenK18","doi":"10.1007/978-3-319-99605-9_28","ee":"https://doi.org/10.1007/978-3-319-99605-9_28","url":"https://dblp.org/rec/conf/hcc/RantanenK18"}, "url":"URL#2568973" }, { "@score":"1", "@id":"2568974", "info":{"authors":{"author":[{"@pid":"176/2554","text":"Wessel Reijers"},{"@pid":"02/5205","text":"Kevin Koidl"},{"@pid":"80/6593-1","text":"David Lewis 0001"},{"@pid":"186/7566","text":"Harshvardhan J. Pandit"},{"@pid":"145/8449","text":"Bert Gordijn"}]},"title":"Discussing Ethical Impacts in Research and Innovation: The Ethics Canvas.","venue":"HCC","pages":"299-313","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ReijersK0PG18","doi":"10.1007/978-3-319-99605-9_23","ee":"https://doi.org/10.1007/978-3-319-99605-9_23","url":"https://dblp.org/rec/conf/hcc/ReijersK0PG18"}, "url":"URL#2568974" }, { "@score":"1", "@id":"2568975", "info":{"authors":{"author":[{"@pid":"181/2600","text":"Jesús Sánchez Gómez"},{"@pid":"56/9151","text":"Ana M. Zornoza"},{"@pid":"46/6314","text":"Virginia Orengo"},{"@pid":"128/2252","text":"Vicente Peñarroja"},{"@pid":"22/10579","text":"Petros Chamakiotis"}]},"title":"Team Feedback Intervention and Team Learning in Virtual Teams: A Moderated Mediation Model of Team Cohesion and Personality.","venue":"HCC","pages":"136-148","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SanchezZOPC18","doi":"10.1007/978-3-319-99605-9_10","ee":"https://doi.org/10.1007/978-3-319-99605-9_10","url":"https://dblp.org/rec/conf/hcc/SanchezZOPC18"}, "url":"URL#2568975" }, { "@score":"1", "@id":"2568976", "info":{"authors":{"author":[{"@pid":"52/8855","text":"Johanna Sefyrin"},{"@pid":"33/1776","text":"Pirjo Elovaara"},{"@pid":"68/2362","text":"Christina Mörtberg"}]},"title":"Feminist Technoscience as a Resource for Working with Science Practices, a Critical Approach, and Gender Equality in Swedish Higher IT Educations.","venue":"HCC","pages":"221-231","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SefyrinEM18","doi":"10.1007/978-3-319-99605-9_16","ee":"https://doi.org/10.1007/978-3-319-99605-9_16","url":"https://dblp.org/rec/conf/hcc/SefyrinEM18"}, "url":"URL#2568976" }, { "@score":"1", "@id":"2568977", "info":{"authors":{"author":[{"@pid":"210/8503","text":"Riana Steyn"},{"@pid":"65/7296","text":"Carina de Villiers"},{"@pid":"118/9984","text":"Hossana Twinomurinzi"}]},"title":"Creating an ICT Skills Enhancement Environment for Entrepreneurs.","venue":"HCC","pages":"60-81","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SteynVT18","doi":"10.1007/978-3-319-99605-9_5","ee":"https://doi.org/10.1007/978-3-319-99605-9_5","url":"https://dblp.org/rec/conf/hcc/SteynVT18"}, "url":"URL#2568977" }, { "@score":"1", "@id":"2568978", "info":{"authors":{"author":[{"@pid":"122/1392","text":"Sam Takavarasha Jr."},{"@pid":"174/8284","text":"Liezel Cilliers"},{"@pid":"231/3023","text":"Willie T. Chinyamurindi"}]},"title":"Assessing ICT Access Disparities Between the Institutional and Home Front: A Case of University Students in South Africa's Eastern Cape.","venue":"HCC","pages":"45-59","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/TakavarashaCC18","doi":"10.1007/978-3-319-99605-9_4","ee":"https://doi.org/10.1007/978-3-319-99605-9_4","url":"https://dblp.org/rec/conf/hcc/TakavarashaCC18"}, "url":"URL#2568978" }, { "@score":"1", "@id":"2568979", "info":{"authors":{"author":{"@pid":"83/4885","text":"Arthur Tatnall"}},"title":"History of Early Australian-Designed Computers.","venue":"HCC","pages":"31-41","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Tatnall18","doi":"10.1007/978-3-319-99605-9_3","ee":"https://doi.org/10.1007/978-3-319-99605-9_3","url":"https://dblp.org/rec/conf/hcc/Tatnall18"}, "url":"URL#2568979" }, { "@score":"1", "@id":"2568980", "info":{"authors":{"author":{"@pid":"53/3364","text":"Maja van der Velden"}},"title":"ICT and Sustainability: Looking Beyond the Anthropocene.","venue":"HCC","pages":"166-180","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Velden18","doi":"10.1007/978-3-319-99605-9_12","ee":"https://doi.org/10.1007/978-3-319-99605-9_12","url":"https://dblp.org/rec/conf/hcc/Velden18"}, "url":"URL#2568980" }, { "@score":"1", "@id":"2568981", "info":{"authors":{"author":[{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"04/863","text":"Louise Leenen"}]},"title":"Cybersecurity Capability and Capacity Building for South Africa.","venue":"HCC","pages":"123-135","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VuurenL18","doi":"10.1007/978-3-319-99605-9_9","ee":"https://doi.org/10.1007/978-3-319-99605-9_9","url":"https://dblp.org/rec/conf/hcc/VuurenL18"}, "url":"URL#2568981" }, { "@score":"1", "@id":"2684964", "info":{"authors":{"author":[{"@pid":"77/711","text":"David Kreps"},{"@pid":"27/1443","text":"Charles Ess"},{"@pid":"04/863","text":"Louise Leenen"},{"@pid":"53/4255","text":"Kai Kimppa"}]},"title":"This Changes Everything - ICT and Climate Change: What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 19-21, 2018, Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"537","publisher":"Springer","year":"2018","type":"Editorship","key":"conf/hcc/2018","doi":"10.1007/978-3-319-99605-9","ee":"https://doi.org/10.1007/978-3-319-99605-9","url":"https://dblp.org/rec/conf/hcc/2018"}, "url":"URL#2684964" }, { "@score":"1", "@id":"3254417", "info":{"authors":{"author":[{"@pid":"184/7904","text":"Johnny Botha"},{"@pid":"95/6309","text":"Mariki M. Eloff"},{"@pid":"00/10437","text":"Marthie Grobler"}]},"title":"Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure.","venue":"HCC","pages":"72-85","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/BothaEG16","doi":"10.1007/978-3-319-44805-3_7","ee":"https://doi.org/10.1007/978-3-319-44805-3_7","url":"https://dblp.org/rec/conf/hcc/BothaEG16"}, "url":"URL#3254417" }, { "@score":"1", "@id":"3254418", "info":{"authors":{"author":[{"@pid":"184/7950","text":"Tharntip Tawnie Chutikulrungsee"},{"@pid":"18/4457","text":"Oliver K. Burmeister"},{"@pid":"74/5621","text":"Yeslam Al-Saggaf"},{"@pid":"33/4088","text":"Maumita Bhattacharya"}]},"title":"Denial of Choice: Group Level Disclosure of Private Information.","venue":"HCC","pages":"229-240","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Chutikulrungsee16","doi":"10.1007/978-3-319-44805-3_19","ee":"https://doi.org/10.1007/978-3-319-44805-3_19","url":"https://dblp.org/rec/conf/hcc/Chutikulrungsee16"}, "url":"URL#3254418" }, { "@score":"1", "@id":"3254419", "info":{"authors":{"author":[{"@pid":"64/11439","text":"Linus Feiten"},{"@pid":"65/11443","text":"Sebastian Sester"},{"@pid":"65/863-2","text":"Christian Zimmermann 0002"},{"@pid":"184/7912","text":"Sebastian Volkmann"},{"@pid":"184/7947","text":"Laura Wehle"},{"@pid":"b/BerndBecker","text":"Bernd Becker 0001"}]},"title":"Revocable Anonymisation in Video Surveillance: A "Digital Cloak of Invisibility".","venue":"HCC","pages":"314-327","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/FeitenSZVWB16","doi":"10.1007/978-3-319-44805-3_25","ee":"https://doi.org/10.1007/978-3-319-44805-3_25","url":"https://dblp.org/rec/conf/hcc/FeitenSZVWB16"}, "url":"URL#3254419" }, { "@score":"1", "@id":"3254420", "info":{"authors":{"author":[{"@pid":"179/4980","text":"Jan Grbac"},{"@pid":"62/4963","text":"Matjaz Kljun"},{"@pid":"16/9747","text":"Klen Copic Pucihar"},{"@pid":"179/5304","text":"Leo Gombac"}]},"title":"Collaborative Annotation Sharing in Physical and Digital Worlds.","venue":"HCC","pages":"303-313","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/GrbacKPG16","doi":"10.1007/978-3-319-44805-3_24","ee":"https://doi.org/10.1007/978-3-319-44805-3_24","url":"https://dblp.org/rec/conf/hcc/GrbacKPG16"}, "url":"URL#3254420" }, { "@score":"1", "@id":"3254421", "info":{"authors":{"author":[{"@pid":"184/8004","text":"Gillian Harvie"},{"@pid":"184/7966","text":"Kenneth Eustace"},{"@pid":"18/4457","text":"Oliver K. Burmeister"}]},"title":"Assistive Technology Devices for the Oldest-Old: Maintaining Independence for the Fourth Age.","venue":"HCC","pages":"25-33","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HarvieEB16","doi":"10.1007/978-3-319-44805-3_3","ee":"https://doi.org/10.1007/978-3-319-44805-3_3","url":"https://dblp.org/rec/conf/hcc/HarvieEB16"}, "url":"URL#3254421" }, { "@score":"1", "@id":"3254422", "info":{"authors":{"author":{"@pid":"148/8648","text":"Halvdan Haugsbakken"}},"title":""To Listen, Share, and to Be Relevant" - Learning Netiquette by Reflective Practice.","venue":"HCC","pages":"191-203","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Haugsbakken16","doi":"10.1007/978-3-319-44805-3_16","ee":"https://doi.org/10.1007/978-3-319-44805-3_16","url":"https://dblp.org/rec/conf/hcc/Haugsbakken16"}, "url":"URL#3254422" }, { "@score":"1", "@id":"3254423", "info":{"authors":{"author":[{"@pid":"84/11536","text":"Olli I. Heimo"},{"@pid":"206/4659","text":"Tapani N. Liukkonen"},{"@pid":"184/7972","text":"Miika Oja-Nisula"},{"@pid":"184/7946","text":"Julius Rajala"},{"@pid":"184/8007","text":"Anne Paavolainen"},{"@pid":"53/4255","text":"Kai K. Kimppa"},{"@pid":"36/4612","text":"Tuomas Mäkilä"}]},"title":"Ethical Gathering of Exercise Metrics from Elderly: Case Jumppatikku.","venue":"HCC","pages":"14-24","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HeimoLORPKM16","doi":"10.1007/978-3-319-44805-3_2","ee":"https://doi.org/10.1007/978-3-319-44805-3_2","url":"https://dblp.org/rec/conf/hcc/HeimoLORPKM16"}, "url":"URL#3254423" }, { "@score":"1", "@id":"3254424", "info":{"authors":{"author":[{"@pid":"97/10913","text":"Sue Hessey"},{"@pid":"31/5917","text":"Hazel Lacohée"},{"@pid":"184/7996","text":"Rob Collingridge"}]},"title":"Balancing Act or Compromise? A Case Study Highlighting the Challenges of Trialling IT Services with the Elderly.","venue":"HCC","pages":"49-60","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/HesseyLC16","doi":"10.1007/978-3-319-44805-3_5","ee":"https://doi.org/10.1007/978-3-319-44805-3_5","url":"https://dblp.org/rec/conf/hcc/HesseyLC16"}, "url":"URL#3254424" }, { "@score":"1", "@id":"3254425", "info":{"authors":{"author":[{"@pid":"184/7925","text":"Sophie Iredale"},{"@pid":"13/4995","text":"Aleksej Heinze"}]},"title":"Ethics and Professional Intimacy Within the Search Engine Optimisation (SEO) Industry.","venue":"HCC","pages":"106-115","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/IredaleH16","doi":"10.1007/978-3-319-44805-3_9","ee":"https://doi.org/10.1007/978-3-319-44805-3_9","url":"https://dblp.org/rec/conf/hcc/IredaleH16"}, "url":"URL#3254425" }, { "@score":"1", "@id":"3254426", "info":{"authors":{"author":[{"@pid":"184/7921","text":"Kaori Ishii"},{"@pid":"184/7928","text":"Taro Komukai"}]},"title":"A Comparative Legal Study on Data Breaches in Japan, the U.S., and the U.K.","venue":"HCC","pages":"86-105","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/IshiiK16","doi":"10.1007/978-3-319-44805-3_8","ee":"https://doi.org/10.1007/978-3-319-44805-3_8","url":"https://dblp.org/rec/conf/hcc/IshiiK16"}, "url":"URL#3254426" }, { "@score":"1", "@id":"3254427", "info":{"authors":{"author":[{"@pid":"62/4963","text":"Matjaz Kljun"},{"@pid":"16/9747","text":"Klen Copic Pucihar"}]},"title":""Break the Ice": The Use of Technology to Initiate Communication in Public Spaces.","venue":"HCC","pages":"143-149","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KljunP16","doi":"10.1007/978-3-319-44805-3_12","ee":"https://doi.org/10.1007/978-3-319-44805-3_12","url":"https://dblp.org/rec/conf/hcc/KljunP16"}, "url":"URL#3254427" }, { "@score":"1", "@id":"3254428", "info":{"authors":{"author":[{"@pid":"148/8682","text":"Jani Simo Sakari Koskinen"},{"@pid":"53/4255","text":"Kai K. Kimppa"}]},"title":"An Unclear Question: Who Owns Patient Information? - A Kantian Take on the Concept of Datenherrschaft.","venue":"HCC","pages":"3-13","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KoskinenK16","doi":"10.1007/978-3-319-44805-3_1","ee":"https://doi.org/10.1007/978-3-319-44805-3_1","url":"https://dblp.org/rec/conf/hcc/KoskinenK16"}, "url":"URL#3254428" }, { "@score":"1", "@id":"3254429", "info":{"authors":{"author":[{"@pid":"77/711","text":"David Kreps"},{"@pid":"18/4457","text":"Oliver K. Burmeister"},{"@pid":"176/2504","text":"Jessica Blaynee"}]},"title":"Skeuomorphic Reassurance: Personhood and Dementia.","venue":"HCC","pages":"61-71","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/KrepsBB16","doi":"10.1007/978-3-319-44805-3_6","ee":"https://doi.org/10.1007/978-3-319-44805-3_6","url":"https://dblp.org/rec/conf/hcc/KrepsBB16"}, "url":"URL#3254429" }, { "@score":"1", "@id":"3254430", "info":{"authors":{"author":[{"@pid":"180/9300","text":"Sonja Th. Kwee-Meier"},{"@pid":"175/7534","text":"Eugen Altendorf"},{"@pid":"78/8268","text":"Alexander Mertens"},{"@pid":"00/5003","text":"Christopher M. Schlick"}]},"title":"Safety-Enhancing Locating Wearables on Passenger Ships: Privacy and Security Perceptions by the Elderly.","venue":"HCC","pages":"34-48","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Kwee-MeierAMS16","doi":"10.1007/978-3-319-44805-3_4","ee":"https://doi.org/10.1007/978-3-319-44805-3_4","url":"https://dblp.org/rec/conf/hcc/Kwee-MeierAMS16"}, "url":"URL#3254430" }, { "@score":"1", "@id":"3254431", "info":{"authors":{"author":{"@pid":"177/8072","text":"H. Patricia McKenna"}},"title":"Edges, Surfaces, and Spaces of Action in 21st Century Urban Environments - Connectivities and Awareness in the City.","venue":"HCC","pages":"328-343","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/McKenna16","doi":"10.1007/978-3-319-44805-3_26","ee":"https://doi.org/10.1007/978-3-319-44805-3_26","url":"https://dblp.org/rec/conf/hcc/McKenna16"}, "url":"URL#3254431" }, { "@score":"1", "@id":"3254432", "info":{"authors":{"author":{"@pid":"184/8017","text":"Donatella Padua"}},"title":"From Caravaggio to Braque: Digital Technology and the Illusion of Augmented Responsibility.","venue":"HCC","pages":"241-256","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Padua16","doi":"10.1007/978-3-319-44805-3_20","ee":"https://doi.org/10.1007/978-3-319-44805-3_20","url":"https://dblp.org/rec/conf/hcc/Padua16"}, "url":"URL#3254432" }, { "@score":"1", "@id":"3254433", "info":{"authors":{"author":[{"@pid":"117/0714","text":"Yushan Pan"},{"@pid":"66/4199","text":"Sisse Finken"}]},"title":"Visualising Actor Network for Cooperative Systems in Marine Technology.","venue":"HCC","pages":"178-190","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PanF16","doi":"10.1007/978-3-319-44805-3_15","ee":"https://doi.org/10.1007/978-3-319-44805-3_15","url":"https://dblp.org/rec/conf/hcc/PanF16"}, "url":"URL#3254433" }, { "@score":"1", "@id":"3254434", "info":{"authors":{"author":[{"@pid":"184/7949","text":"Parakum Pathirana"},{"@pid":"184/8027","text":"Aye Aye Khin"}]},"title":"Adoption of Social Media for the Banking Sector in Sri Lanka.","venue":"HCC","pages":"166-177","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PathiranaK16","doi":"10.1007/978-3-319-44805-3_14","ee":"https://doi.org/10.1007/978-3-319-44805-3_14","url":"https://dblp.org/rec/conf/hcc/PathiranaK16"}, "url":"URL#3254434" }, { "@score":"1", "@id":"3254435", "info":{"authors":{"author":[{"@pid":"28/3249","text":"Jackie Phahlamohlaka"},{"@pid":"184/7958","text":"David Kepaletwe"},{"@pid":"184/7961","text":"Vusi Ndala"},{"@pid":"184/7910","text":"Lebogang Phahlamohlaka"}]},"title":"Enabling Socio-Economic Activities: Opening Global Markets for the Marginalized Through Secure ICT Use.","venue":"HCC","pages":"150-165","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PhahlamohlakaKN16","doi":"10.1007/978-3-319-44805-3_13","ee":"https://doi.org/10.1007/978-3-319-44805-3_13","url":"https://dblp.org/rec/conf/hcc/PhahlamohlakaKN16"}, "url":"URL#3254435" }, { "@score":"1", "@id":"3254436", "info":{"authors":{"author":[{"@pid":"184/7916","text":"Myrto Pirli"},{"@pid":"66/4199","text":"Sisse Finken"},{"@pid":"68/2362","text":"Christina Mörtberg"}]},"title":"The Embodiment of Relationships of Adult Facebookers.","venue":"HCC","pages":"204-214","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PirliFM16","doi":"10.1007/978-3-319-44805-3_17","ee":"https://doi.org/10.1007/978-3-319-44805-3_17","url":"https://dblp.org/rec/conf/hcc/PirliFM16"}, "url":"URL#3254436" }, { "@score":"1", "@id":"3254437", "info":{"authors":{"author":[{"@pid":"16/9747","text":"Klen Copic Pucihar"},{"@pid":"62/4963","text":"Matjaz Kljun"},{"@pid":"01/5396","text":"Paul Coulton"}]},"title":"Using a Mobile Phone as a 2D Virtual Tracing Tool: Static Peephole vs. Magic Lens.","venue":"HCC","pages":"277-288","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/PuciharKC16","doi":"10.1007/978-3-319-44805-3_22","ee":"https://doi.org/10.1007/978-3-319-44805-3_22","url":"https://dblp.org/rec/conf/hcc/PuciharKC16"}, "url":"URL#3254437" }, { "@score":"1", "@id":"3254438", "info":{"authors":{"author":[{"@pid":"176/2554","text":"Wessel Reijers"},{"@pid":"145/8449","text":"Bert Gordijn"},{"@pid":"16/508","text":"Declan O'Sullivan"}]},"title":"Narrative Ethics of Personalisation Technologies.","venue":"HCC","pages":"130-140","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/ReijersGO16","doi":"10.1007/978-3-319-44805-3_11","ee":"https://doi.org/10.1007/978-3-319-44805-3_11","url":"https://dblp.org/rec/conf/hcc/ReijersGO16"}, "url":"URL#3254438" }, { "@score":"1", "@id":"3254439", "info":{"authors":{"author":[{"@pid":"184/8000","text":"Kaapo Seppälä"},{"@pid":"84/11536","text":"Olli I. Heimo"},{"@pid":"184/7930","text":"Timo Korkalainen"},{"@pid":"184/7920","text":"Juho Pääkylä"},{"@pid":"184/8035","text":"Jussi Latvala"},{"@pid":"46/9401","text":"Seppo Helle"},{"@pid":"184/7994","text":"Lauri Härkänen"},{"@pid":"44/442","text":"Sami Jokela"},{"@pid":"184/7967","text":"Lauri Järvenpää"},{"@pid":"184/7902","text":"Frans Saukko"},{"@pid":"184/7977","text":"Lauri Viinikkala"},{"@pid":"36/4612","text":"Tuomas Mäkilä"},{"@pid":"25/1636","text":"Teijo Lehtonen"}]},"title":"Examining User Experience in an Augmented Reality Adventure Game: Case Luostarinmäki Handicrafts Museum.","venue":"HCC","pages":"257-276","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/SeppalaHKPLHHJJ16","doi":"10.1007/978-3-319-44805-3_21","ee":"https://doi.org/10.1007/978-3-319-44805-3_21","url":"https://dblp.org/rec/conf/hcc/SeppalaHKPLHHJJ16"}, "url":"URL#3254439" }, { "@score":"1", "@id":"3254440", "info":{"authors":{"author":[{"@pid":"35/2043","text":"Kimmo Tarkkanen"},{"@pid":"30/1007","text":"Ville Harkke"}]},"title":"Manifestations of Users' Privacy Concerns in a Formative Usability Test of Social Networking Site.","venue":"HCC","pages":"215-228","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/TarkkanenH16","doi":"10.1007/978-3-319-44805-3_18","ee":"https://doi.org/10.1007/978-3-319-44805-3_18","url":"https://dblp.org/rec/conf/hcc/TarkkanenH16"}, "url":"URL#3254440" }, { "@score":"1", "@id":"3254441", "info":{"authors":{"author":{"@pid":"83/4885","text":"Arthur Tatnall"}},"title":"The Beginnings of Government Support for Computers in Schools - The State Computer Education Centre of Victoria in the 1980s.","venue":"HCC","pages":"291-302","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/Tatnall16","doi":"10.1007/978-3-319-44805-3_23","ee":"https://doi.org/10.1007/978-3-319-44805-3_23","url":"https://dblp.org/rec/conf/hcc/Tatnall16"}, "url":"URL#3254441" }, { "@score":"1", "@id":"3254442", "info":{"authors":{"author":[{"@pid":"04/312","text":"Tero Vartiainen"},{"@pid":"84/11536","text":"Olli I. Heimo"},{"@pid":"53/4255","text":"Kai K. Kimppa"}]},"title":"A Participatory Design Program for Making Ethical Choices in Client Vendor Relations in ISD.","venue":"HCC","pages":"116-129","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hcc/VartiainenHK16","doi":"10.1007/978-3-319-44805-3_10","ee":"https://doi.org/10.1007/978-3-319-44805-3_10","url":"https://dblp.org/rec/conf/hcc/VartiainenHK16"}, "url":"URL#3254442" }, { "@score":"1", "@id":"3361331", "info":{"authors":{"author":[{"@pid":"77/711","text":"David Kreps"},{"@pid":"62/4901","text":"Gordon Fletcher"},{"@pid":"96/6189","text":"Marie Griffiths"}]},"title":"Technology and Intimacy: Choice or Coercion - 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"474","publisher":"Springer","year":"2016","type":"Editorship","key":"conf/hcc/2016","doi":"10.1007/978-3-319-44805-3","ee":"https://doi.org/10.1007/978-3-319-44805-3","url":"https://dblp.org/rec/conf/hcc/2016"}, "url":"URL#3361331" }, { "@score":"1", "@id":"3861391", "info":{"authors":{"author":[{"@pid":"148/8832","text":"Gomaa Mohamed Agag"},{"@pid":"04/9029","text":"Ibrahim Elbeltagi"}]},"title":"E-retailing Ethics in Egypt and Its Effect on Customer Repurchase Intention.","venue":"HCC","pages":"1-14","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/AgagE14","doi":"10.1007/978-3-662-44208-1_1","ee":"https://doi.org/10.1007/978-3-662-44208-1_1","url":"https://dblp.org/rec/conf/hcc/AgagE14"}, "url":"URL#3861391" }, { "@score":"1", "@id":"3861392", "info":{"authors":{"author":[{"@pid":"66/4199","text":"Sisse Finken"},{"@pid":"68/2362","text":"Christina Mörtberg"}]},"title":"Performing Elderliness - Intra-actions with Digital Domestic Care Technologies.","venue":"HCC","pages":"307-319","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/FinkenM14","doi":"10.1007/978-3-662-44208-1_25","ee":"https://doi.org/10.1007/978-3-662-44208-1_25","url":"https://dblp.org/rec/conf/hcc/FinkenM14"}, "url":"URL#3861392" }, { "@score":"1", "@id":"3861393", "info":{"authors":{"author":{"@pid":"59/8983","text":"Anne Gerdes"}},"title":"A Privacy Preserving Design Framework in Relation to an Environmental Scanning System for Fighting Organized Crime.","venue":"HCC","pages":"226-238","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Gerdes14","doi":"10.1007/978-3-662-44208-1_19","ee":"https://doi.org/10.1007/978-3-662-44208-1_19","url":"https://dblp.org/rec/conf/hcc/Gerdes14"}, "url":"URL#3861393" }, { "@score":"1", "@id":"3861394", "info":{"authors":{"author":{"@pid":"129/0229","text":"Mhorag Goff"}},"title":"Electronic Patient Records and Benefits to Clinicians: An Actor-Network Study of a Technological Innovation in the NHS.","venue":"HCC","pages":"320-332","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Goff14","doi":"10.1007/978-3-662-44208-1_26","ee":"https://doi.org/10.1007/978-3-662-44208-1_26","url":"https://dblp.org/rec/conf/hcc/Goff14"}, "url":"URL#3861394" }, { "@score":"1", "@id":"3861395", "info":{"authors":{"author":[{"@pid":"00/10437","text":"Marthie Grobler"},{"@pid":"148/8872","text":"Ignus P. Swart"}]},"title":"On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain.","venue":"HCC","pages":"239-254","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GroblerS14","doi":"10.1007/978-3-662-44208-1_20","ee":"https://doi.org/10.1007/978-3-662-44208-1_20","url":"https://dblp.org/rec/conf/hcc/GroblerS14"}, "url":"URL#3861395" }, { "@score":"1", "@id":"3861396", "info":{"authors":{"author":{"@pid":"148/8648","text":"Halvdan Haugsbakken"}},"title":"Connecting Social Capital by Social Media.","venue":"HCC","pages":"15-26","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Haugsbakken14","doi":"10.1007/978-3-662-44208-1_2","ee":"https://doi.org/10.1007/978-3-662-44208-1_2","url":"https://dblp.org/rec/conf/hcc/Haugsbakken14"}, "url":"URL#3861396" }, { "@score":"1", "@id":"3861397", "info":{"authors":{"author":[{"@pid":"118/9868","text":"Renier van Heerden"},{"@pid":"148/8670","text":"Mercia M. Malan"},{"@pid":"39/10872","text":"Francois Mouton"},{"@pid":"77/1143","text":"Barry Irwin"}]},"title":"Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time.","venue":"HCC","pages":"280-292","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HeerdenMMI14","doi":"10.1007/978-3-662-44208-1_23","ee":"https://doi.org/10.1007/978-3-662-44208-1_23","url":"https://dblp.org/rec/conf/hcc/HeerdenMMI14"}, "url":"URL#3861397" }, { "@score":"1", "@id":"3861398", "info":{"authors":{"author":{"@pid":"93/6801","text":"Jaana Holvikivi"}},"title":"Enhancing Innovation Potential through Local Capacity Building in Education.","venue":"HCC","pages":"27-38","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Holvikivi14","doi":"10.1007/978-3-662-44208-1_3","ee":"https://doi.org/10.1007/978-3-662-44208-1_3","url":"https://dblp.org/rec/conf/hcc/Holvikivi14"}, "url":"URL#3861398" }, { "@score":"1", "@id":"3861399", "info":{"authors":{"author":{"@pid":"79/4826","text":"Iordanis Kavathatzopoulos"}},"title":"Independent Agents and Ethics.","venue":"HCC","pages":"39-46","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Kavathatzopoulos14","doi":"10.1007/978-3-662-44208-1_4","ee":"https://doi.org/10.1007/978-3-662-44208-1_4","url":"https://dblp.org/rec/conf/hcc/Kavathatzopoulos14"}, "url":"URL#3861399" }, { "@score":"1", "@id":"3861400", "info":{"authors":{"author":[{"@pid":"148/8682","text":"Jani Simo Sakari Koskinen"},{"@pid":"148/8771","text":"Sari Knaapi-Junnila"}]},"title":"Information Technology - The Unredeemed Opportunity to Reduce Cultural and Social Capital Gaps between Citizens and Professionals in Healthcare.","venue":"HCC","pages":"333-346","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/KoskinenK14","doi":"10.1007/978-3-662-44208-1_27","ee":"https://doi.org/10.1007/978-3-662-44208-1_27","url":"https://dblp.org/rec/conf/hcc/KoskinenK14"}, "url":"URL#3861400" }, { "@score":"1", "@id":"3861401", "info":{"authors":{"author":{"@pid":"77/711","text":"David Kreps"}},"title":"The Time of Our Lives: Understanding Irreversible Complex User Experiences.","venue":"HCC","pages":"47-56","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Kreps14","doi":"10.1007/978-3-662-44208-1_5","ee":"https://doi.org/10.1007/978-3-662-44208-1_5","url":"https://dblp.org/rec/conf/hcc/Kreps14"}, "url":"URL#3861401" }, { "@score":"1", "@id":"3861402", "info":{"authors":{"author":[{"@pid":"41/2408","text":"Janne Lahtiranta"},{"@pid":"04/605","text":"Markku I. Nurminen"}]},"title":"PHR Revisioned - Navigating in the Personal Health Space.","venue":"HCC","pages":"347-361","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LahtirantaN14","doi":"10.1007/978-3-662-44208-1_28","ee":"https://doi.org/10.1007/978-3-662-44208-1_28","url":"https://dblp.org/rec/conf/hcc/LahtirantaN14"}, "url":"URL#3861402" }, { "@score":"1", "@id":"3861403", "info":{"authors":{"author":[{"@pid":"148/8863","text":"Thomas Taro Lennerfors"},{"@pid":"148/8729","text":"Per Fors"},{"@pid":"148/8733","text":"Jolanda van Rooijen"}]},"title":"Sustainable ICT: A Critique from the Perspective of World Systems Theory.","venue":"HCC","pages":"57-68","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LennerforsFR14","doi":"10.1007/978-3-662-44208-1_6","ee":"https://doi.org/10.1007/978-3-662-44208-1_6","url":"https://dblp.org/rec/conf/hcc/LennerforsFR14"}, "url":"URL#3861403" }, { "@score":"1", "@id":"3861404", "info":{"authors":{"author":[{"@pid":"09/10452","text":"Christopher Leslie"},{"@pid":"148/8886","text":"Patrick Gryczka"}]},"title":"Ingenuity in Isolation: Poland in the International History of the Internet.","venue":"HCC","pages":"162-175","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LeslieG14","doi":"10.1007/978-3-662-44208-1_14","ee":"https://doi.org/10.1007/978-3-662-44208-1_14","url":"https://dblp.org/rec/conf/hcc/LeslieG14"}, "url":"URL#3861404" }, { "@score":"1", "@id":"3861405", "info":{"authors":{"author":[{"@pid":"l/KaiUweLoser","text":"Kai-Uwe Loser"},{"@pid":"120/5815","text":"Martin Degeling"}]},"title":"Security and Privacy as Hygiene Factors of Developer Behavior in Small and Agile Teams.","venue":"HCC","pages":"255-265","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LoserD14","doi":"10.1007/978-3-662-44208-1_21","ee":"https://doi.org/10.1007/978-3-662-44208-1_21","url":"https://dblp.org/rec/conf/hcc/LoserD14"}, "url":"URL#3861405" }, { "@score":"1", "@id":"3861406", "info":{"authors":{"author":[{"@pid":"118/9939","text":"Laurence Masclet"},{"@pid":"18/9068","text":"Philippe Goujon"}]},"title":"Origins, Developments and Future of the Concept of Innovation: Opening the Economic Framing of Innovation to Social, Ethical, Political Parameters to Achieve Responsibility: Strengths and Limits.","venue":"HCC","pages":"69-77","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MascletG14","doi":"10.1007/978-3-662-44208-1_7","ee":"https://doi.org/10.1007/978-3-662-44208-1_7","url":"https://dblp.org/rec/conf/hcc/MascletG14"}, "url":"URL#3861406" }, { "@score":"1", "@id":"3861407", "info":{"authors":{"author":[{"@pid":"39/10872","text":"Francois Mouton"},{"@pid":"04/863","text":"Louise Leenen"},{"@pid":"148/8670","text":"Mercia M. Malan"},{"@pid":"v/HeinSVenter","text":"H. S. Venter"}]},"title":"Towards an Ontological Model Defining the Social Engineering Domain.","venue":"HCC","pages":"266-279","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MoutonLMV14","doi":"10.1007/978-3-662-44208-1_22","ee":"https://doi.org/10.1007/978-3-662-44208-1_22","url":"https://dblp.org/rec/conf/hcc/MoutonLMV14"}, "url":"URL#3861407" }, { "@score":"1", "@id":"3861408", "info":{"authors":{"author":[{"@pid":"58/1073","text":"Marketta Niemelä"},{"@pid":"60/1523","text":"Veikko Ikonen"},{"@pid":"51/4230","text":"Jaana Leikas"},{"@pid":"148/8710","text":"Kristiina Kantola"},{"@pid":"01/1240","text":"Minna Kulju"},{"@pid":"16/3811","text":"Antti Tammela"},{"@pid":"87/10018","text":"Mari Ylikauppila"}]},"title":"Human-Driven Design: A Human-Driven Approach to the Design of Technology.","venue":"HCC","pages":"78-91","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/NiemelaILKKTY14","doi":"10.1007/978-3-662-44208-1_8","ee":"https://doi.org/10.1007/978-3-662-44208-1_8","url":"https://dblp.org/rec/conf/hcc/NiemelaILKKTY14"}, "url":"URL#3861408" }, { "@score":"1", "@id":"3861409", "info":{"authors":{"author":[{"@pid":"66/9246","text":"Norberto Patrignani"},{"@pid":"78/5618","text":"Diane Whitehouse"}]},"title":"Slow Tech: The Bridge between Computer Ethics and Business Ethics.","venue":"HCC","pages":"92-106","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PatrignaniW14","doi":"10.1007/978-3-662-44208-1_9","ee":"https://doi.org/10.1007/978-3-662-44208-1_9","url":"https://dblp.org/rec/conf/hcc/PatrignaniW14"}, "url":"URL#3861409" }, { "@score":"1", "@id":"3861410", "info":{"authors":{"author":[{"@pid":"28/3249","text":"Jackie Phahlamohlaka"},{"@pid":"59/10872","text":"Zama Dlamini"},{"@pid":"148/8668","text":"Thami Mnisi"},{"@pid":"148/8662","text":"Thulani Mashiane"},{"@pid":"148/8717","text":"Linda Malinga"}]},"title":"Towards a Smart Community Centre: SEIDET Digital Village.","venue":"HCC","pages":"107-121","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PhahlamohlakaDMMM14","doi":"10.1007/978-3-662-44208-1_10","ee":"https://doi.org/10.1007/978-3-662-44208-1_10","url":"https://dblp.org/rec/conf/hcc/PhahlamohlakaDMMM14"}, "url":"URL#3861410" }, { "@score":"1", "@id":"3861411", "info":{"authors":{"author":[{"@pid":"07/2453","text":"Ramón Puigjaner"},{"@pid":"144/6694","text":"Jordi Fornes"}]},"title":"Implementation Criteria of University Computer Education in Spain between First Experiences and the European Higher Education Space (EHES).","venue":"HCC","pages":"176-190","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PuigjanerF14","doi":"10.1007/978-3-662-44208-1_15","ee":"https://doi.org/10.1007/978-3-662-44208-1_15","url":"https://dblp.org/rec/conf/hcc/PuigjanerF14"}, "url":"URL#3861411" }, { "@score":"1", "@id":"3861412", "info":{"authors":{"author":[{"@pid":"148/8680","text":"Minna Rantanen"},{"@pid":"84/11536","text":"Olli I. Heimo"}]},"title":"Problem in Patient Information System Acquirement in Finland: Translation and Terminology.","venue":"HCC","pages":"362-375","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/RantanenH14","doi":"10.1007/978-3-662-44208-1_29","ee":"https://doi.org/10.1007/978-3-662-44208-1_29","url":"https://dblp.org/rec/conf/hcc/RantanenH14"}, "url":"URL#3861412" }, { "@score":"1", "@id":"3861413", "info":{"authors":{"author":[{"@pid":"134/0188","text":"Valery V. Shilov"},{"@pid":"148/8702","text":"Sergey A. Silantiev"}]},"title":"Reasoning vs. Orthodoxy, or, The Lesson from the Fate of Russian "Reasoning Machine".","venue":"HCC","pages":"191-202","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ShilovS14","doi":"10.1007/978-3-662-44208-1_16","ee":"https://doi.org/10.1007/978-3-662-44208-1_16","url":"https://dblp.org/rec/conf/hcc/ShilovS14"}, "url":"URL#3861413" }, { "@score":"1", "@id":"3861414", "info":{"authors":{"author":{"@pid":"134/0090","text":"Marina Smolevitskaya"}},"title":"The Personal Documentary Funds of the Computer Technology Founders at the Polytechnic Museum.","venue":"HCC","pages":"203-213","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Smolevitskaya14","doi":"10.1007/978-3-662-44208-1_17","ee":"https://doi.org/10.1007/978-3-662-44208-1_17","url":"https://dblp.org/rec/conf/hcc/Smolevitskaya14"}, "url":"URL#3861414" }, { "@score":"1", "@id":"3861415", "info":{"authors":{"author":[{"@pid":"83/4885","text":"Arthur Tatnall"},{"@pid":"89/1927","text":"Bill Davey"}]},"title":"History of the Use of Computers and Information Technology in Education in Universities and Schools in Victoria.","venue":"HCC","pages":"214-225","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/TatnallD14","doi":"10.1007/978-3-662-44208-1_18","ee":"https://doi.org/10.1007/978-3-662-44208-1_18","url":"https://dblp.org/rec/conf/hcc/TatnallD14"}, "url":"URL#3861415" }, { "@score":"1", "@id":"3861416", "info":{"authors":{"author":[{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"00/10437","text":"Marthie Grobler"},{"@pid":"04/863","text":"Louise Leenen"},{"@pid":"28/3249","text":"Jackie Phahlamohlaka"}]},"title":"Proposed Model for a Cybersecurity Centre of Innovation for South Africa.","venue":"HCC","pages":"293-306","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/VuurenGLP14","doi":"10.1007/978-3-662-44208-1_24","ee":"https://doi.org/10.1007/978-3-662-44208-1_24","url":"https://dblp.org/rec/conf/hcc/VuurenGLP14"}, "url":"URL#3861416" }, { "@score":"1", "@id":"3861417", "info":{"authors":{"author":[{"@pid":"78/5618","text":"Diane Whitehouse"},{"@pid":"66/9246","text":"Norberto Patrignani"}]},"title":"Computers, Time and Speed: Five Slow Tech Case Studies.","venue":"HCC","pages":"122-135","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/WhitehouseP14","doi":"10.1007/978-3-662-44208-1_11","ee":"https://doi.org/10.1007/978-3-662-44208-1_11","url":"https://dblp.org/rec/conf/hcc/WhitehouseP14"}, "url":"URL#3861417" }, { "@score":"1", "@id":"3861418", "info":{"authors":{"author":[{"@pid":"148/8712","text":"Sachiko Yanagihara"},{"@pid":"53/4023","text":"Hiroshi Koga"}]},"title":"Case Study of Practice of the Tea Ceremony (Sado) through Distance Education - On the Ethics of ICT.","venue":"HCC","pages":"136-145","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/YanagiharaK14","doi":"10.1007/978-3-662-44208-1_12","ee":"https://doi.org/10.1007/978-3-662-44208-1_12","url":"https://dblp.org/rec/conf/hcc/YanagiharaK14"}, "url":"URL#3861418" }, { "@score":"1", "@id":"3861419", "info":{"authors":{"author":{"@pid":"42/6809","text":"Marie d'Udekem-Gevers"}},"title":"A Little-Known Chapter in the History of Computing in Belgium: The Machine Mathématique IRSIA-FNRS.","venue":"HCC","pages":"146-161","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/dUdekem-Gevers14","doi":"10.1007/978-3-662-44208-1_13","ee":"https://doi.org/10.1007/978-3-662-44208-1_13","url":"https://dblp.org/rec/conf/hcc/dUdekem-Gevers14"}, "url":"URL#3861419" }, { "@score":"1", "@id":"3964021", "info":{"authors":{"author":[{"@pid":"53/4255","text":"Kai Kimppa"},{"@pid":"78/5618","text":"Diane Whitehouse"},{"@pid":"131/9608","text":"Tiina Kuusela"},{"@pid":"28/3249","text":"Jackie Phahlamohlaka"}]},"title":"ICT and Society - 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"431","publisher":"Springer","year":"2014","type":"Editorship","key":"conf/hcc/2014","doi":"10.1007/978-3-662-44208-1","ee":"https://doi.org/10.1007/978-3-662-44208-1","url":"https://dblp.org/rec/conf/hcc/2014"}, "url":"URL#3964021" }, { "@score":"1", "@id":"4419185", "info":{"authors":{"author":{"@pid":"66/10688","text":"Noora Alghatam"}},"title":"Formatting the Public Sector with ICTs: Exploring Institutional Sources and Processes.","venue":"HCC","pages":"11-21","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Alghatam12","doi":"10.1007/978-3-642-33332-3_2","ee":"https://doi.org/10.1007/978-3-642-33332-3_2","url":"https://dblp.org/rec/conf/hcc/Alghatam12"}, "url":"URL#4419185" }, { "@score":"1", "@id":"4419186", "info":{"authors":{"author":[{"@pid":"47/1451","text":"Erik M. Boertjes"},{"@pid":"118/9877","text":"Bas Gerrits"},{"@pid":"94/4276","text":"Robert E. Kooij"},{"@pid":"59/117","text":"Peter-Paul van Maanen"},{"@pid":"26/3233","text":"Stephan Raaijmakers"},{"@pid":"30/8313","text":"Joost de Wit"}]},"title":"Towards a Social Media-Based Model of Trust and Its Application.","venue":"HCC","pages":"250-263","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BoertjesGKMRW12","doi":"10.1007/978-3-642-33332-3_23","ee":"https://doi.org/10.1007/978-3-642-33332-3_23","url":"https://dblp.org/rec/conf/hcc/BoertjesGKMRW12"}, "url":"URL#4419186" }, { "@score":"1", "@id":"4419187", "info":{"authors":{"author":[{"@pid":"118/9855","text":"Amélie Bohas"},{"@pid":"49/4152","text":"Laïd Bouzidi"}]},"title":"Towards a Sustainable Governance of Information Systems: Devising a Maturity Assessment Tool of Eco-Responsibility Inspired by the Balanced Scorecard.","venue":"HCC","pages":"143-155","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BohasB12","doi":"10.1007/978-3-642-33332-3_14","ee":"https://doi.org/10.1007/978-3-642-33332-3_14","url":"https://dblp.org/rec/conf/hcc/BohasB12"}, "url":"URL#4419187" }, { "@score":"1", "@id":"4419188", "info":{"authors":{"author":{"@pid":"52/10680","text":"Carla Marisa Bonina"}},"title":"Building ICT Critical Infrastructures for Trade Regulations: Implications from a National Initiative in Mexico.","venue":"HCC","pages":"22-33","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Bonina12","doi":"10.1007/978-3-642-33332-3_3","ee":"https://doi.org/10.1007/978-3-642-33332-3_3","url":"https://dblp.org/rec/conf/hcc/Bonina12"}, "url":"URL#4419188" }, { "@score":"1", "@id":"4419189", "info":{"authors":{"author":[{"@pid":"66/7002","text":"Gunilla Bradley"},{"@pid":"78/5618","text":"Diane Whitehouse"}]},"title":"Challenges to Peace in the 21st Century: Working towards a Good Information and Communication Society.","venue":"HCC","pages":"274-284","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BradleyW12","doi":"10.1007/978-3-642-33332-3_25","ee":"https://doi.org/10.1007/978-3-642-33332-3_25","url":"https://dblp.org/rec/conf/hcc/BradleyW12"}, "url":"URL#4419189" }, { "@score":"1", "@id":"4419190", "info":{"authors":{"author":[{"@pid":"118/9927","text":"Ana Cardoso"},{"@pid":"30/593","text":"João Álvaro Carvalho"}]},"title":"ICT and Environmental Sustainability: A Case Study of a Grassroots Initiative.","venue":"HCC","pages":"69-78","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CardosoC12","doi":"10.1007/978-3-642-33332-3_7","ee":"https://doi.org/10.1007/978-3-642-33332-3_7","url":"https://dblp.org/rec/conf/hcc/CardosoC12"}, "url":"URL#4419190" }, { "@score":"1", "@id":"4419191", "info":{"authors":{"author":[{"@pid":"44/2979","text":"Tony Cornford"},{"@pid":"74/3184","text":"Valentina Lichtner"}]},"title":"Sustainable and Responsible ICT Innovation in Healthcare: A Long View and Continuous Ethical Watch Required.","venue":"HCC","pages":"100-110","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CornfordL12","doi":"10.1007/978-3-642-33332-3_10","ee":"https://doi.org/10.1007/978-3-642-33332-3_10","url":"https://dblp.org/rec/conf/hcc/CornfordL12"}, "url":"URL#4419191" }, { "@score":"1", "@id":"4419192", "info":{"authors":{"author":[{"@pid":"70/3206","text":"Wendy L. Cukier"},{"@pid":"118/9901","text":"Valerie Fox"},{"@pid":"23/9504","text":"Hossein Rahnama"}]},"title":"Building Human Infrastructure for the Digital Economy: Ryerson's Digital Media Zone.","venue":"HCC","pages":"156-169","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CukierFR12","doi":"10.1007/978-3-642-33332-3_15","ee":"https://doi.org/10.1007/978-3-642-33332-3_15","url":"https://dblp.org/rec/conf/hcc/CukierFR12"}, "url":"URL#4419192" }, { "@score":"1", "@id":"4419193", "info":{"authors":{"author":[{"@pid":"99/10677","text":"Eduardo Henrique Diniz"},{"@pid":"96/7760","text":"Manuella Maia Ribeiro"}]},"title":"Redesigning the Relationship between Government and Civil Society: An Investigation of Emerging Models of Networked Democracy in Brazil.","venue":"HCC","pages":"299-309","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/DinizR12","doi":"10.1007/978-3-642-33332-3_27","ee":"https://doi.org/10.1007/978-3-642-33332-3_27","url":"https://dblp.org/rec/conf/hcc/DinizR12"}, "url":"URL#4419193" }, { "@score":"1", "@id":"4419194", "info":{"authors":{"author":{"@pid":"51/10940","text":"Mathias Fuchs"}},"title":"Social Games: Privacy and Security.","venue":"HCC","pages":"330-337","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Fuchs12","doi":"10.1007/978-3-642-33332-3_30","ee":"https://doi.org/10.1007/978-3-642-33332-3_30","url":"https://dblp.org/rec/conf/hcc/Fuchs12"}, "url":"URL#4419194" }, { "@score":"1", "@id":"4419195", "info":{"authors":{"author":{"@pid":"86/1579","text":"Don Gotterbarn"}},"title":"Corporate Social Media Use Policy: Meeting Business and Ethical Responsibilities.","venue":"HCC","pages":"387-398","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Gotterbarn12","doi":"10.1007/978-3-642-33332-3_36","ee":"https://doi.org/10.1007/978-3-642-33332-3_36","url":"https://dblp.org/rec/conf/hcc/Gotterbarn12"}, "url":"URL#4419195" }, { "@score":"1", "@id":"4419196", "info":{"authors":{"author":[{"@pid":"00/10437","text":"Marthie Grobler"},{"@pid":"72/10872","text":"Joey Jansen van Vuuren"},{"@pid":"04/863","text":"Louise Leenen"}]},"title":"Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward.","venue":"HCC","pages":"215-225","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GroblerVL12","doi":"10.1007/978-3-642-33332-3_20","ee":"https://doi.org/10.1007/978-3-642-33332-3_20","url":"https://dblp.org/rec/conf/hcc/GroblerVL12"}, "url":"URL#4419196" }, { "@score":"1", "@id":"4419197", "info":{"authors":{"author":[{"@pid":"118/9871","text":"Nick A. Guldemond"},{"@pid":"83/960","text":"Magda David Hercheui"}]},"title":"Technology and Care for Patients with Chronic Conditions: The Chronic Care Model as a Framework for the Integration of ICT.","venue":"HCC","pages":"123-133","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GuldemondH12","doi":"10.1007/978-3-642-33332-3_12","ee":"https://doi.org/10.1007/978-3-642-33332-3_12","url":"https://dblp.org/rec/conf/hcc/GuldemondH12"}, "url":"URL#4419197" }, { "@score":"1", "@id":"4419198", "info":{"authors":{"author":[{"@pid":"118/9868","text":"Renier van Heerden"},{"@pid":"118/9902","text":"Heloise Pieterse"},{"@pid":"77/1143","text":"Barry Irwin"}]},"title":"Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.","venue":"HCC","pages":"226-236","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HeerdenPI12","doi":"10.1007/978-3-642-33332-3_21","ee":"https://doi.org/10.1007/978-3-642-33332-3_21","url":"https://dblp.org/rec/conf/hcc/HeerdenPI12"}, "url":"URL#4419198" }, { "@score":"1", "@id":"4419199", "info":{"authors":{"author":[{"@pid":"83/960","text":"Magda David Hercheui"},{"@pid":"93/2181","text":"Brian Nicholson"},{"@pid":"23/8291","text":"Aghil Ameripour"}]},"title":"Theorising Open Development through an Institutional Lens: A Study of Iranian Online Interactions.","venue":"HCC","pages":"349-359","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HercheuiNA12","doi":"10.1007/978-3-642-33332-3_32","ee":"https://doi.org/10.1007/978-3-642-33332-3_32","url":"https://dblp.org/rec/conf/hcc/HercheuiNA12"}, "url":"URL#4419199" }, { "@score":"1", "@id":"4419200", "info":{"authors":{"author":[{"@pid":"83/960","text":"Magda David Hercheui"},{"@pid":"78/5618","text":"Diane Whitehouse"},{"@pid":"84/4651","text":"William J. McIver Jr."},{"@pid":"28/3249","text":"Jackie Phahlamohlaka"}]},"title":"ICT Critical Infrastructures and Society: Introduction to the HCC10 Conference Proceedings.","venue":"HCC","pages":"1-7","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HercheuiWMP12","doi":"10.1007/978-3-642-33332-3_1","ee":"https://doi.org/10.1007/978-3-642-33332-3_1","url":"https://dblp.org/rec/conf/hcc/HercheuiWMP12"}, "url":"URL#4419200" }, { "@score":"1", "@id":"4419201", "info":{"authors":{"author":[{"@pid":"118/9926","text":"Christina Herzog"},{"@pid":"03/4160","text":"Laurent Lefèvre"},{"@pid":"08/2911","text":"Jean-Marc Pierson"}]},"title":"Green IT for Innovation and Innovation for Green IT: The Virtuous Circle.","venue":"HCC","pages":"79-89","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HerzogLP12","doi":"10.1007/978-3-642-33332-3_8","ee":"https://doi.org/10.1007/978-3-642-33332-3_8","url":"https://dblp.org/rec/conf/hcc/HerzogLP12"}, "url":"URL#4419201" }, { "@score":"1", "@id":"4419202", "info":{"authors":{"author":[{"@pid":"118/9972","text":"Mattias Höjer"},{"@pid":"09/4066","text":"Katarina Larsen"},{"@pid":"118/9874","text":"Helene Wintzell"}]},"title":"Sustainable Communications and Innovation: Different Types of Effects from Collaborative Research Including University and Companies in the ICT-Sector.","venue":"HCC","pages":"170-182","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HojerLW12","doi":"10.1007/978-3-642-33332-3_16","ee":"https://doi.org/10.1007/978-3-642-33332-3_16","url":"https://dblp.org/rec/conf/hcc/HojerLW12"}, "url":"URL#4419202" }, { "@score":"1", "@id":"4419203", "info":{"authors":{"author":{"@pid":"88/10395","text":"Miranda Kajtazi"}},"title":"Information Inadequacy: The Lack of Needed Information in Human, Social and Industrial Affairs.","venue":"HCC","pages":"320-329","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Kajtazi12","doi":"10.1007/978-3-642-33332-3_29","ee":"https://doi.org/10.1007/978-3-642-33332-3_29","url":"https://dblp.org/rec/conf/hcc/Kajtazi12"}, "url":"URL#4419203" }, { "@score":"1", "@id":"4419204", "info":{"authors":{"author":{"@pid":"118/9968","text":"Andrea Knaut"}},"title":"Informed Strategies of Political Action in IP-Based Social Media.","venue":"HCC","pages":"376-386","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Knaut12","doi":"10.1007/978-3-642-33332-3_35","ee":"https://doi.org/10.1007/978-3-642-33332-3_35","url":"https://dblp.org/rec/conf/hcc/Knaut12"}, "url":"URL#4419204" }, { "@score":"1", "@id":"4419205", "info":{"authors":{"author":{"@pid":"118/9910","text":"Agata Królikowski"}},"title":"Packet Inspection - Shifting the Paradigm of Fundamental Rights.","venue":"HCC","pages":"360-368","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Krolikowski12","doi":"10.1007/978-3-642-33332-3_33","ee":"https://doi.org/10.1007/978-3-642-33332-3_33","url":"https://dblp.org/rec/conf/hcc/Krolikowski12"}, "url":"URL#4419205" }, { "@score":"1", "@id":"4419206", "info":{"authors":{"author":[{"@pid":"84/10872","text":"Aubrey Labuschagne"},{"@pid":"95/6309","text":"Mariki M. Eloff"},{"@pid":"97/4697","text":"Namosha Veerasamy"}]},"title":"The Dark Side of Web 2.0.","venue":"HCC","pages":"237-249","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LabuschagneEV12","doi":"10.1007/978-3-642-33332-3_22","ee":"https://doi.org/10.1007/978-3-642-33332-3_22","url":"https://dblp.org/rec/conf/hcc/LabuschagneEV12"}, "url":"URL#4419206" }, { "@score":"1", "@id":"4419207", "info":{"authors":{"author":{"@pid":"58/916","text":"Jens-Martin Loebel"}},"title":"Is Privacy Dead? - An Inquiry into GPS-Based Geolocation and Facial Recognition Systems.","venue":"HCC","pages":"338-348","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Loebel12","doi":"10.1007/978-3-642-33332-3_31","ee":"https://doi.org/10.1007/978-3-642-33332-3_31","url":"https://dblp.org/rec/conf/hcc/Loebel12"}, "url":"URL#4419207" }, { "@score":"1", "@id":"4419208", "info":{"authors":{"author":{"@pid":"118/9933","text":"Aaron K. Martin"}},"title":"National Identity Infrastructures: Lessons from the United Kingdom.","venue":"HCC","pages":"44-55","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Martin12","doi":"10.1007/978-3-642-33332-3_5","ee":"https://doi.org/10.1007/978-3-642-33332-3_5","url":"https://dblp.org/rec/conf/hcc/Martin12"}, "url":"URL#4419208" }, { "@score":"1", "@id":"4419209", "info":{"authors":{"author":{"@pid":"88/1308","text":"John Martino"}},"title":"Video Games and the Militarisation of Society: Towards a Theoretical and Conceptual Framework.","venue":"HCC","pages":"264-273","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Martino12","doi":"10.1007/978-3-642-33332-3_24","ee":"https://doi.org/10.1007/978-3-642-33332-3_24","url":"https://dblp.org/rec/conf/hcc/Martino12"}, "url":"URL#4419209" }, { "@score":"1", "@id":"4419210", "info":{"authors":{"author":[{"@pid":"118/9939","text":"Laurence Masclet"},{"@pid":"18/9068","text":"Philippe Goujon"}]},"title":"Implementing Ethics in Information Systems, Presuppositions and Consequences in Ethics and Information Systems.","venue":"HCC","pages":"287-298","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MascletG12","doi":"10.1007/978-3-642-33332-3_26","ee":"https://doi.org/10.1007/978-3-642-33332-3_26","url":"https://dblp.org/rec/conf/hcc/MascletG12"}, "url":"URL#4419210" }, { "@score":"1", "@id":"4419211", "info":{"authors":{"author":{"@pid":"118/9883","text":"Silvia Masiero"}},"title":"Getting It Right: The Importance of Targeting Structural Causes of Failure in E-Government.","venue":"HCC","pages":"34-43","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Masiero12","doi":"10.1007/978-3-642-33332-3_4","ee":"https://doi.org/10.1007/978-3-642-33332-3_4","url":"https://dblp.org/rec/conf/hcc/Masiero12"}, "url":"URL#4419211" }, { "@score":"1", "@id":"4419212", "info":{"authors":{"author":[{"@pid":"35/10918","text":"Claudia Padovani"},{"@pid":"15/10919","text":"Elena Pavan"}]},"title":"International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes.","venue":"HCC","pages":"56-65","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PadovaniP12","doi":"10.1007/978-3-642-33332-3_6","ee":"https://doi.org/10.1007/978-3-642-33332-3_6","url":"https://dblp.org/rec/conf/hcc/PadovaniP12"}, "url":"URL#4419212" }, { "@score":"1", "@id":"4419213", "info":{"authors":{"author":[{"@pid":"66/9246","text":"Norberto Patrignani"},{"@pid":"79/4826","text":"Iordanis Kavathatzopoulos"}]},"title":"Is the Post-Turing ICT Sustainable?","venue":"HCC","pages":"183-191","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PatrignaniK12","doi":"10.1007/978-3-642-33332-3_17","ee":"https://doi.org/10.1007/978-3-642-33332-3_17","url":"https://dblp.org/rec/conf/hcc/PatrignaniK12"}, "url":"URL#4419213" }, { "@score":"1", "@id":"4419214", "info":{"authors":{"author":{"@pid":"s/DougSchuler","text":"Douglas Schuler"}},"title":"Civic Intelligence and CSCW.","venue":"HCC","pages":"369-375","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Schuler12","doi":"10.1007/978-3-642-33332-3_34","ee":"https://doi.org/10.1007/978-3-642-33332-3_34","url":"https://dblp.org/rec/conf/hcc/Schuler12"}, "url":"URL#4419214" }, { "@score":"1", "@id":"4419215", "info":{"authors":{"author":[{"@pid":"18/3772","text":"Abbas Shahim"},{"@pid":"85/5027","text":"Ronald Batenburg"},{"@pid":"118/9860","text":"Geert Vermunt"}]},"title":"Governance, Risk and Compliance: A Strategic Alignment Perspective Applied to Two Case Studies.","venue":"HCC","pages":"202-212","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ShahimBV12","doi":"10.1007/978-3-642-33332-3_19","ee":"https://doi.org/10.1007/978-3-642-33332-3_19","url":"https://dblp.org/rec/conf/hcc/ShahimBV12"}, "url":"URL#4419215" }, { "@score":"1", "@id":"4419216", "info":{"authors":{"author":{"@pid":"91/3825","text":"Richard Taylor"}},"title":"ITGS - A Blueprint for a Social Informatics Course in Pre-university Education.","venue":"HCC","pages":"192-201","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Taylor12","doi":"10.1007/978-3-642-33332-3_18","ee":"https://doi.org/10.1007/978-3-642-33332-3_18","url":"https://dblp.org/rec/conf/hcc/Taylor12"}, "url":"URL#4419216" }, { "@score":"1", "@id":"4419217", "info":{"authors":{"author":{"@pid":"118/9984","text":"Hossana Twinomurinzi"}},"title":"The Role of ICT in Sustainable and Responsible Development: E-Skilling.","venue":"HCC","pages":"90-99","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Twinomurinzi12","doi":"10.1007/978-3-642-33332-3_9","ee":"https://doi.org/10.1007/978-3-642-33332-3_9","url":"https://dblp.org/rec/conf/hcc/Twinomurinzi12"}, "url":"URL#4419217" }, { "@score":"1", "@id":"4419218", "info":{"authors":{"author":[{"@pid":"118/9951","text":"Sokratis Vavilis"},{"@pid":"54/4069","text":"Milan Petkovic"},{"@pid":"93/4627","text":"Nicola Zannone"}]},"title":"Impact of ICT on Home Healthcare.","venue":"HCC","pages":"111-122","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/VavilisPZ12","doi":"10.1007/978-3-642-33332-3_11","ee":"https://doi.org/10.1007/978-3-642-33332-3_11","url":"https://dblp.org/rec/conf/hcc/VavilisPZ12"}, "url":"URL#4419218" }, { "@score":"1", "@id":"4419219", "info":{"authors":{"author":[{"@pid":"51/616","text":"Fons Wijnhoven"},{"@pid":"118/9937","text":"Pim Dietz"},{"@pid":"27/2938","text":"Chintan Amrit"}]},"title":"Information Waste, the Environment and Human Action: Concepts and Research.","venue":"HCC","pages":"134-142","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/WijnhovenDA12","doi":"10.1007/978-3-642-33332-3_13","ee":"https://doi.org/10.1007/978-3-642-33332-3_13","url":"https://dblp.org/rec/conf/hcc/WijnhovenDA12"}, "url":"URL#4419219" }, { "@score":"1", "@id":"4419220", "info":{"authors":{"author":[{"@pid":"25/323","text":"Yingqin Zheng"},{"@pid":"82/6384-1","text":"Cheng Zhang 0001"}]},"title":"Cyberactivism and Collective Agency: Cases from China.","venue":"HCC","pages":"310-319","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ZhengZ12","doi":"10.1007/978-3-642-33332-3_28","ee":"https://doi.org/10.1007/978-3-642-33332-3_28","url":"https://dblp.org/rec/conf/hcc/ZhengZ12"}, "url":"URL#4419220" }, { "@score":"1", "@id":"4515627", "info":{"authors":{"author":[{"@pid":"83/960","text":"Magda David Hercheui"},{"@pid":"78/5618","text":"Diane Whitehouse"},{"@pid":"84/4651","text":"William J. McIver Jr."},{"@pid":"28/3249","text":"Jackie Phahlamohlaka"}]},"title":"ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"386","publisher":"Springer","year":"2012","type":"Editorship","key":"conf/hcc/2012","doi":"10.1007/978-3-642-33332-3","ee":"https://doi.org/10.1007/978-3-642-33332-3","url":"https://dblp.org/rec/conf/hcc/2012"}, "url":"URL#4515627" }, { "@score":"1", "@id":"4914565", "info":{"authors":{"author":[{"@pid":"67/9539","text":"Ali Alkaabi"},{"@pid":"27/5369","text":"George M. Mohay"},{"@pid":"81/39","text":"Adrian McCullagh"},{"@pid":"60/9539","text":"Nicholas Chantler"}]},"title":"Money Laundering and FATF Compliance by the International Community.","venue":"HCC","pages":"86-97","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/AlkaabiMMC10","doi":"10.1007/978-3-642-15479-9_8","ee":"https://doi.org/10.1007/978-3-642-15479-9_8","url":"https://dblp.org/rec/conf/hcc/AlkaabiMMC10"}, "url":"URL#4914565" }, { "@score":"1", "@id":"4914566", "info":{"authors":{"author":[{"@pid":"78/3792","text":"Jacques Berleur"},{"@pid":"83/960","text":"Magda David Hercheui"},{"@pid":"36/6947","text":"Lorenz M. Hilty"}]},"title":"What Kind of Information Society? Introduction to the HCC9 Conference Proceedings.","venue":"HCC","pages":"3-9","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BerleurHH10","doi":"10.1007/978-3-642-15479-9_1","ee":"https://doi.org/10.1007/978-3-642-15479-9_1","url":"https://dblp.org/rec/conf/hcc/BerleurHH10"}, "url":"URL#4914566" }, { "@score":"1", "@id":"4914567", "info":{"authors":{"author":[{"@pid":"78/3792","text":"Jacques Berleur"},{"@pid":"78/5618","text":"Diane Whitehouse"},{"@pid":"18/9068","text":"Philippe Goujon"},{"@pid":"37/9067","text":"Catherine Flick"}]},"title":"Ethics and ICT Governance.","venue":"HCC","pages":"13-21","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BerleurWGF10","doi":"10.1007/978-3-642-15479-9_2","ee":"https://doi.org/10.1007/978-3-642-15479-9_2","url":"https://dblp.org/rec/conf/hcc/BerleurWGF10"}, "url":"URL#4914567" }, { "@score":"1", "@id":"4914568", "info":{"authors":{"author":{"@pid":"55/4367","text":"Klaus Brunnstein"}},"title":"Trends of Privacy and Surveillance in the Information Society - Extended Abstract.","venue":"HCC","pages":"178-179","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Brunnstein10","doi":"10.1007/978-3-642-15479-9_17","ee":"https://doi.org/10.1007/978-3-642-15479-9_17","url":"https://dblp.org/rec/conf/hcc/Brunnstein10"}, "url":"URL#4914568" }, { "@score":"1", "@id":"4914569", "info":{"authors":{"author":[{"@pid":"79/8775","text":"Katharina Bunse"},{"@pid":"98/8771","text":"Matthias Vodicka"}]},"title":"Managing Energy Efficiency in Manufacturing Processes - Implementing Energy Performance in Production Information Technology Systems.","venue":"HCC","pages":"260-268","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BunseV10","doi":"10.1007/978-3-642-15479-9_25","ee":"https://doi.org/10.1007/978-3-642-15479-9_25","url":"https://dblp.org/rec/conf/hcc/BunseV10"}, "url":"URL#4914569" }, { "@score":"1", "@id":"4914570", "info":{"authors":{"author":{"@pid":"18/4457","text":"Oliver K. Burmeister"}},"title":"Virtuality Improves the Well Being of Seniors through Increasing Social Interaction.","venue":"HCC","pages":"131-141","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Burmeister10","doi":"10.1007/978-3-642-15479-9_12","ee":"https://doi.org/10.1007/978-3-642-15479-9_12","url":"https://dblp.org/rec/conf/hcc/Burmeister10"}, "url":"URL#4914570" }, { "@score":"1", "@id":"4914571", "info":{"authors":{"author":{"@pid":"84/3128","text":"William J. Caelli"}},"title":"Society - Totally Dependent Upon ICT? Introduction to the CIP-2010 Conference Proceedings.","venue":"HCC","pages":"313-314","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Caelli10","doi":"10.1007/978-3-642-15479-9_29","ee":"https://doi.org/10.1007/978-3-642-15479-9_29","url":"https://dblp.org/rec/conf/hcc/Caelli10"}, "url":"URL#4914571" }, { "@score":"1", "@id":"4914572", "info":{"authors":{"author":[{"@pid":"83/4339","text":"Ester Ciancamerla"},{"@pid":"10/8332","text":"Chiara Foglietta"},{"@pid":"90/8331","text":"Davide Lefevre"},{"@pid":"13/5346","text":"Michele Minichino"},{"@pid":"94/8331","text":"Leonid Lev"},{"@pid":"98/8331","text":"Yosi Shneck"}]},"title":"Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network.","venue":"HCC","pages":"350-362","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CiancamerlaFLMLS10","doi":"10.1007/978-3-642-15479-9_33","ee":"https://doi.org/10.1007/978-3-642-15479-9_33","url":"https://dblp.org/rec/conf/hcc/CiancamerlaFLMLS10"}, "url":"URL#4914572" }, { "@score":"1", "@id":"4914573", "info":{"authors":{"author":{"@pid":"43/2810","text":"Roger Clarke"}},"title":"Civil Society Must Publish Standards Documents.","venue":"HCC","pages":"180-184","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Clarke10","doi":"10.1007/978-3-642-15479-9_18","ee":"https://doi.org/10.1007/978-3-642-15479-9_18","url":"https://dblp.org/rec/conf/hcc/Clarke10"}, "url":"URL#4914573" }, { "@score":"1", "@id":"4914574", "info":{"authors":{"author":[{"@pid":"76/8922","text":"Markus Dick"},{"@pid":"08/1313","text":"Stefan Naumann"},{"@pid":"33/6175","text":"Norbert Kuhn"}]},"title":"A Model and Selected Instances of Green and Sustainable Software.","venue":"HCC","pages":"248-259","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/DickNK10","doi":"10.1007/978-3-642-15479-9_24","ee":"https://doi.org/10.1007/978-3-642-15479-9_24","url":"https://dblp.org/rec/conf/hcc/DickNK10"}, "url":"URL#4914574" }, { "@score":"1", "@id":"4914575", "info":{"authors":{"author":[{"@pid":"75/6602","text":"John Dobson"},{"@pid":"75/9539","text":"Richard Duncombe"},{"@pid":"93/2181","text":"Brian Nicholson"}]},"title":"Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico.","venue":"HCC","pages":"292-309","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/DobsonDN10","doi":"10.1007/978-3-642-15479-9_28","ee":"https://doi.org/10.1007/978-3-642-15479-9_28","url":"https://dblp.org/rec/conf/hcc/DobsonDN10"}, "url":"URL#4914575" }, { "@score":"1", "@id":"4914576", "info":{"authors":{"author":[{"@pid":"96/9538","text":"Ian Ellefsen"},{"@pid":"s/SHvSolms","text":"Sebastiaan H. von Solms"}]},"title":"C-SAW: Critical Information Infrastructure Protection through Simplification.","venue":"HCC","pages":"315-325","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/EllefsenS10","doi":"10.1007/978-3-642-15479-9_30","ee":"https://doi.org/10.1007/978-3-642-15479-9_30","url":"https://dblp.org/rec/conf/hcc/EllefsenS10"}, "url":"URL#4914576" }, { "@score":"1", "@id":"4914577", "info":{"authors":{"author":[{"@pid":"73/2278","text":"Yola Georgiadou"},{"@pid":"f/SimoneFischerHubner","text":"Simone Fischer-Hübner"}]},"title":"Surveillance and Privacy.","venue":"HCC","pages":"175-177","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GeorgiadouF10","doi":"10.1007/978-3-642-15479-9_16","ee":"https://doi.org/10.1007/978-3-642-15479-9_16","url":"https://dblp.org/rec/conf/hcc/GeorgiadouF10"}, "url":"URL#4914577" }, { "@score":"1", "@id":"4914578", "info":{"authors":{"author":[{"@pid":"18/9068","text":"Philippe Goujon"},{"@pid":"37/9067","text":"Catherine Flick"}]},"title":"Ethical Governance for Emerging ICT: Opening Cognitive Framing and Achieving Reflexivity.","venue":"HCC","pages":"98-111","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GoujonF10","doi":"10.1007/978-3-642-15479-9_9","ee":"https://doi.org/10.1007/978-3-642-15479-9_9","url":"https://dblp.org/rec/conf/hcc/GoujonF10"}, "url":"URL#4914578" }, { "@score":"1", "@id":"4914579", "info":{"authors":{"author":[{"@pid":"63/6448","text":"António Grilo 0001"},{"@pid":"17/6674","text":"Augusto Casaca"},{"@pid":"n/MarioSerafimNunes","text":"Mário Serafim Nunes"},{"@pid":"80/9539","text":"Carlos Fortunato"}]},"title":"Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure.","venue":"HCC","pages":"373-383","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GriloCNF10","doi":"10.1007/978-3-642-15479-9_35","ee":"https://doi.org/10.1007/978-3-642-15479-9_35","url":"https://dblp.org/rec/conf/hcc/GriloCNF10"}, "url":"URL#4914579" }, { "@score":"1", "@id":"4914580", "info":{"authors":{"author":[{"@pid":"36/6947","text":"Lorenz M. Hilty"},{"@pid":"83/960","text":"Magda David Hercheui"}]},"title":"ICT and Sustainable Development.","venue":"HCC","pages":"227-235","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HiltyH10","doi":"10.1007/978-3-642-15479-9_22","ee":"https://doi.org/10.1007/978-3-642-15479-9_22","url":"https://dblp.org/rec/conf/hcc/HiltyH10"}, "url":"URL#4914580" }, { "@score":"1", "@id":"4914581", "info":{"authors":{"author":[{"@pid":"h/JaapHenkHoepman","text":"Jaap-Henk Hoepman"},{"@pid":"71/5593","text":"George B. Huitema"}]},"title":"Privacy Enhanced Fraud Resistant Road Pricing.","venue":"HCC","pages":"202-213","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/HoepmanH10","doi":"10.1007/978-3-642-15479-9_20","ee":"https://doi.org/10.1007/978-3-642-15479-9_20","url":"https://dblp.org/rec/conf/hcc/HoepmanH10"}, "url":"URL#4914581" }, { "@score":"1", "@id":"4914582", "info":{"authors":{"author":{"@pid":"64/9539","text":"John W. Houghton"}},"title":"ICT and the Environment in Developing Countries: A Review of Opportunities and Developments.","venue":"HCC","pages":"236-247","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Houghton10","doi":"10.1007/978-3-642-15479-9_23","ee":"https://doi.org/10.1007/978-3-642-15479-9_23","url":"https://dblp.org/rec/conf/hcc/Houghton10"}, "url":"URL#4914582" }, { "@score":"1", "@id":"4914583", "info":{"authors":{"author":{"@pid":"77/711","text":"David Kreps"}},"title":"Virtual Technologies and Social Shaping.","venue":"HCC","pages":"115-117","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Kreps10","doi":"10.1007/978-3-642-15479-9_10","ee":"https://doi.org/10.1007/978-3-642-15479-9_10","url":"https://dblp.org/rec/conf/hcc/Kreps10"}, "url":"URL#4914583" }, { "@score":"1", "@id":"4914584", "info":{"authors":{"author":[{"@pid":"33/6392","text":"Nicolai Kuntze"},{"@pid":"45/1443","text":"Carsten Rudolph"}]},"title":"Privacy in Distributed Commercial Applications.","venue":"HCC","pages":"214-224","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/KuntzeR10","doi":"10.1007/978-3-642-15479-9_21","ee":"https://doi.org/10.1007/978-3-642-15479-9_21","url":"https://dblp.org/rec/conf/hcc/KuntzeR10"}, "url":"URL#4914584" }, { "@score":"1", "@id":"4914585", "info":{"authors":{"author":[{"@pid":"32/4266","text":"John Lenarcic"},{"@pid":"46/9539","text":"Pradipta Sarkar"}]},"title":"The Tragedy of the Virtual Commons as Manifested in the Death of Blogs.","venue":"HCC","pages":"142-149","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LenarcicS10","doi":"10.1007/978-3-642-15479-9_13","ee":"https://doi.org/10.1007/978-3-642-15479-9_13","url":"https://dblp.org/rec/conf/hcc/LenarcicS10"}, "url":"URL#4914585" }, { "@score":"1", "@id":"4914586", "info":{"authors":{"author":[{"@pid":"04/6910","text":"Martin Masek"},{"@pid":"30/4393","text":"Adrian Boeing"},{"@pid":"52/9539","text":"William Bailey"}]},"title":"Critical Infrastructure Protection Risk Modelling with Games Technology.","venue":"HCC","pages":"363-372","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MasekBB10","doi":"10.1007/978-3-642-15479-9_34","ee":"https://doi.org/10.1007/978-3-642-15479-9_34","url":"https://dblp.org/rec/conf/hcc/MasekBB10"}, "url":"URL#4914586" }, { "@score":"1", "@id":"4914587", "info":{"authors":{"author":[{"@pid":"73/2119","text":"Andreas Möller"},{"@pid":"r/ArnoRolf","text":"Arno Rolf"}]},"title":"IT Support for Sustainable Development in Organizations.","venue":"HCC","pages":"281-291","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MollerR10","doi":"10.1007/978-3-642-15479-9_27","ee":"https://doi.org/10.1007/978-3-642-15479-9_27","url":"https://dblp.org/rec/conf/hcc/MollerR10"}, "url":"URL#4914587" }, { "@score":"1", "@id":"4914588", "info":{"authors":{"author":[{"@pid":"31/6706","text":"Ansgar Mondorf"},{"@pid":"w/MariaWimmer","text":"Maria A. Wimmer"}]},"title":"The European VCD System: Facilitating Public Procurement through Criteria-to-Evidence Mapping.","venue":"HCC","pages":"73-85","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MondorfW10","doi":"10.1007/978-3-642-15479-9_7","ee":"https://doi.org/10.1007/978-3-642-15479-9_7","url":"https://dblp.org/rec/conf/hcc/MondorfW10"}, "url":"URL#4914588" }, { "@score":"1", "@id":"4914589", "info":{"authors":{"author":[{"@pid":"47/9539","text":"Nicholas Charles Patterson"},{"@pid":"24/4093","text":"Michael Hobbs"}]},"title":"A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds.","venue":"HCC","pages":"161-171","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/PattersonH10","doi":"10.1007/978-3-642-15479-9_15","ee":"https://doi.org/10.1007/978-3-642-15479-9_15","url":"https://dblp.org/rec/conf/hcc/PattersonH10"}, "url":"URL#4914589" }, { "@score":"1", "@id":"4914590", "info":{"authors":{"author":{"@pid":"13/1096","text":"Erika Pearson"}},"title":"Making a Good (Virtual) First Impression: The Use of Visuals in Online Impression Management and Creating Identity Performances.","venue":"HCC","pages":"118-130","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Pearson10","doi":"10.1007/978-3-642-15479-9_11","ee":"https://doi.org/10.1007/978-3-642-15479-9_11","url":"https://dblp.org/rec/conf/hcc/Pearson10"}, "url":"URL#4914590" }, { "@score":"1", "@id":"4914591", "info":{"authors":{"author":{"@pid":"80/5108","text":"Mizanur Rahman"}},"title":"ICT Governance versus Community Empowerment: Grassroots Evidence from Bangladesh.","venue":"HCC","pages":"33-50","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Rahman10","doi":"10.1007/978-3-642-15479-9_4","ee":"https://doi.org/10.1007/978-3-642-15479-9_4","url":"https://dblp.org/rec/conf/hcc/Rahman10"}, "url":"URL#4914591" }, { "@score":"1", "@id":"4914592", "info":{"authors":{"author":[{"@pid":"72/6195","text":"Tahir M. Riaz"},{"@pid":"71/9539","text":"Gustav H. Haraldsson"},{"@pid":"63/9539","text":"Jose G. Lopaz"},{"@pid":"74/997","text":"Jens Myrup Pedersen"},{"@pid":"35/2235","text":"Ole Brun Madsen"}]},"title":"On Planning of FTTH Access Networks with and without Redundancy.","venue":"HCC","pages":"326-337","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/RiazHLPM10","doi":"10.1007/978-3-642-15479-9_31","ee":"https://doi.org/10.1007/978-3-642-15479-9_31","url":"https://dblp.org/rec/conf/hcc/RiazHLPM10"}, "url":"URL#4914592" }, { "@score":"1", "@id":"4914593", "info":{"authors":{"author":[{"@pid":"69/9539","text":"Fabiana Soares Santana"},{"@pid":"57/9539","text":"Claudio Barberato"},{"@pid":"82/9539","text":"Antonio Mauro Saraiva"}]},"title":"A Reference Process to Design Information Systems for Sustainable Design Based on LCA, PSS, Social and Economic Aspects.","venue":"HCC","pages":"269-280","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SantanaBS10","doi":"10.1007/978-3-642-15479-9_26","ee":"https://doi.org/10.1007/978-3-642-15479-9_26","url":"https://dblp.org/rec/conf/hcc/SantanaBS10"}, "url":"URL#4914593" }, { "@score":"1", "@id":"4914594", "info":{"authors":{"author":[{"@pid":"57/824","text":"Desmond Allan Schmidt"},{"@pid":"73/3463","text":"Suriadi Suriadi"},{"@pid":"63/3652","text":"Alan Tickle"},{"@pid":"05/4615","text":"Andrew J. Clark"},{"@pid":"27/5369","text":"George M. Mohay"},{"@pid":"72/3375","text":"Ejaz Ahmed"},{"@pid":"83/9539","text":"James Mackie"}]},"title":"A Distributed Denial of Service Testbed.","venue":"HCC","pages":"338-349","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SchmidtSTCMAM10","doi":"10.1007/978-3-642-15479-9_32","ee":"https://doi.org/10.1007/978-3-642-15479-9_32","url":"https://dblp.org/rec/conf/hcc/SchmidtSTCMAM10"}, "url":"URL#4914594" }, { "@score":"1", "@id":"4914595", "info":{"authors":{"author":[{"@pid":"39/4041","text":"Mohamed Shareef"},{"@pid":"o/AdegboyegaKOjo","text":"Adegboyega K. Ojo"},{"@pid":"j/TomaszJanowski","text":"Tomasz Janowski"}]},"title":"Exploring Digital Divide in the Maldives.","venue":"HCC","pages":"51-63","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ShareefOJ10","doi":"10.1007/978-3-642-15479-9_5","ee":"https://doi.org/10.1007/978-3-642-15479-9_5","url":"https://dblp.org/rec/conf/hcc/ShareefOJ10"}, "url":"URL#4914595" }, { "@score":"1", "@id":"4914596", "info":{"authors":{"author":{"@pid":"76/9539","text":"Linda Spark"}},"title":"The Demographic Factors Affecting University Students' Intention to Pirate Software.","venue":"HCC","pages":"22-32","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Spark10","doi":"10.1007/978-3-642-15479-9_3","ee":"https://doi.org/10.1007/978-3-642-15479-9_3","url":"https://dblp.org/rec/conf/hcc/Spark10"}, "url":"URL#4914596" }, { "@score":"1", "@id":"4914597", "info":{"authors":{"author":[{"@pid":"56/9539","text":"Junbin Su"},{"@pid":"54/3212","text":"Vladislav V. Fomin 0001"}]},"title":"Balancing Public and Private Interests in ICT Standardisation: The Case of AVS in China.","venue":"HCC","pages":"64-72","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SuF10","doi":"10.1007/978-3-642-15479-9_6","ee":"https://doi.org/10.1007/978-3-642-15479-9_6","url":"https://dblp.org/rec/conf/hcc/SuF10"}, "url":"URL#4914597" }, { "@score":"1", "@id":"4914598", "info":{"authors":{"author":[{"@pid":"73/3463","text":"Suriadi Suriadi"},{"@pid":"63/3652","text":"Alan Tickle"},{"@pid":"72/3375","text":"Ejaz Ahmed"},{"@pid":"02/1964-1","text":"Jason Smith 0001"},{"@pid":"48/3760","text":"Hasmukh Morarji"}]},"title":"Risk Modelling the Transition of SCADA System to IPv6.","venue":"HCC","pages":"384-395","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SuriadiTASM10","doi":"10.1007/978-3-642-15479-9_36","ee":"https://doi.org/10.1007/978-3-642-15479-9_36","url":"https://dblp.org/rec/conf/hcc/SuriadiTASM10"}, "url":"URL#4914598" }, { "@score":"1", "@id":"4914599", "info":{"authors":{"author":[{"@pid":"48/9539","text":"Jeroen Verplanke"},{"@pid":"270/9769","text":"Javier Martinez Martin"},{"@pid":"49/586","text":"Gianluca Miscione"},{"@pid":"73/2278","text":"Yola Georgiadou"},{"@pid":"49/2313-2","text":"David Coleman 0002"},{"@pid":"72/9539","text":"Abdishakur Awil Hassan"}]},"title":"Citizen Surveillance of the State: A Mirror for eGovernment?","venue":"HCC","pages":"185-201","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/VerplankeMMGCH10","doi":"10.1007/978-3-642-15479-9_19","ee":"https://doi.org/10.1007/978-3-642-15479-9_19","url":"https://dblp.org/rec/conf/hcc/VerplankeMMGCH10"}, "url":"URL#4914599" }, { "@score":"1", "@id":"4914600", "info":{"authors":{"author":{"@pid":"50/9539","text":"Sean J. Westwood"}},"title":"How to Measure Public Opinion in the Networked Age: Working in a Googleocracy or a Googlearchy?","venue":"HCC","pages":"150-160","year":"2010","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Westwood10","doi":"10.1007/978-3-642-15479-9_14","ee":"https://doi.org/10.1007/978-3-642-15479-9_14","url":"https://dblp.org/rec/conf/hcc/Westwood10"}, "url":"URL#4914600" }, { "@score":"1", "@id":"5000214", "info":{"authors":{"author":[{"@pid":"78/3792","text":"Jacques Berleur"},{"@pid":"83/960","text":"Magda David Hercheui"},{"@pid":"36/6947","text":"Lorenz M. Hilty"}]},"title":"What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings","venue":["HCC","IFIP Advances in Information and Communication Technology"],"volume":"328","publisher":"Springer","year":"2010","type":"Editorship","key":"conf/hcc/2010","doi":"10.1007/978-3-642-15479-9","ee":"https://doi.org/10.1007/978-3-642-15479-9","url":"https://dblp.org/rec/conf/hcc/2010"}, "url":"URL#5000214" }, { "@score":"1", "@id":"5353693", "info":{"authors":{"author":{"@pid":"78/3792","text":"Jacques Berleur"}},"title":"15 years of ways of Internet governance: Towards a new agenda for action.","venue":"HCC","pages":"255-274","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Berleur08","doi":"10.1007/978-0-387-84822-8_17","ee":"https://doi.org/10.1007/978-0-387-84822-8_17","url":"https://dblp.org/rec/conf/hcc/Berleur08"}, "url":"URL#5353693" }, { "@score":"1", "@id":"5353694", "info":{"authors":{"author":{"@pid":"08/6035","text":"Solomon B. Bishaw"}},"title":"Institutional strategies towards improving health information systems (HIS) in Sub-Saharan Africa.","venue":"HCC","pages":"191-207","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Bishaw08","doi":"10.1007/978-0-387-84822-8_13","ee":"https://doi.org/10.1007/978-0-387-84822-8_13","url":"https://dblp.org/rec/conf/hcc/Bishaw08"}, "url":"URL#5353694" }, { "@score":"1", "@id":"5353695", "info":{"authors":{"author":{"@pid":"15/4723","text":"Dimitris Boucas"}},"title":"National variations of the information society: Evidence from the Greek case.","venue":"HCC","pages":"63-79","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Boucas08","doi":"10.1007/978-0-387-84822-8_5","ee":"https://doi.org/10.1007/978-0-387-84822-8_5","url":"https://dblp.org/rec/conf/hcc/Boucas08"}, "url":"URL#5353695" }, { "@score":"1", "@id":"5353696", "info":{"authors":{"author":[{"@pid":"13/5862","text":"Walter Brown"},{"@pid":"73/4065","text":"Irwin Brown"}]},"title":"Next generation ICT policy in South Africa: Towards a human development-based ICT policy.","venue":"HCC","pages":"109-123","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BrownB08","doi":"10.1007/978-0-387-84822-8_8","ee":"https://doi.org/10.1007/978-0-387-84822-8_8","url":"https://dblp.org/rec/conf/hcc/BrownB08"}, "url":"URL#5353696" }, { "@score":"1", "@id":"5353697", "info":{"authors":{"author":[{"@pid":"50/4410","text":"Ineke Buskens"},{"@pid":"07/3292","text":"Gertrudes Macueve"},{"@pid":"17/5664","text":"Ibou Sane"},{"@pid":"69/3202","text":"Anne Webb"}]},"title":"Gender research in Africa into ICTs for empowerment (GRACE).","venue":"HCC","pages":"363-367","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/BuskensMSW08","doi":"10.1007/978-0-387-84822-8_26","ee":"https://doi.org/10.1007/978-0-387-84822-8_26","url":"https://dblp.org/rec/conf/hcc/BuskensMSW08"}, "url":"URL#5353697" }, { "@score":"1", "@id":"5353698", "info":{"authors":{"author":[{"@pid":"19/6672","text":"Elaine Byrne"},{"@pid":"53/1814","text":"Lizette Weilbach"}]},"title":"A human environmentalist approach to diffusion in ICT policies.","venue":"HCC","pages":"209-222","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ByrneW08","doi":"10.1007/978-0-387-84822-8_14","ee":"https://doi.org/10.1007/978-0-387-84822-8_14","url":"https://dblp.org/rec/conf/hcc/ByrneW08"}, "url":"URL#5353698" }, { "@score":"1", "@id":"5353699", "info":{"authors":{"author":{"@pid":"77/662","text":"Ioanna Chini"}},"title":"ICT policy as a governance domain: The case of Greece and the European Commission.","venue":"HCC","pages":"45-62","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Chini08","doi":"10.1007/978-0-387-84822-8_4","ee":"https://doi.org/10.1007/978-0-387-84822-8_4","url":"https://dblp.org/rec/conf/hcc/Chini08"}, "url":"URL#5353699" }, { "@score":"1", "@id":"5353700", "info":{"authors":{"author":[{"@pid":"44/2979","text":"Tony Cornford"},{"@pid":"33/3681","text":"Diego D. Navarra"}]},"title":"Technology, globalisation, and governance: Research perspectives and prospects.","venue":"HCC","pages":"81-94","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CornfordN08","doi":"10.1007/978-0-387-84822-8_6","ee":"https://doi.org/10.1007/978-0-387-84822-8_6","url":"https://dblp.org/rec/conf/hcc/CornfordN08"}, "url":"URL#5353700" }, { "@score":"1", "@id":"5353701", "info":{"authors":{"author":[{"@pid":"73/2278","text":"Yola Georgiadou"},{"@pid":"87/2034","text":"Vincent Homburg"}]},"title":"The argumentative structure of spatial data infrastructure initiatives in America and Africa.","venue":"HCC","pages":"31-44","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/GeorgiadouH08","doi":"10.1007/978-0-387-84822-8_3","ee":"https://doi.org/10.1007/978-0-387-84822-8_3","url":"https://dblp.org/rec/conf/hcc/GeorgiadouH08"}, "url":"URL#5353701" }, { "@score":"1", "@id":"5353702", "info":{"authors":{"author":{"@pid":"64/6335","text":"Leila Hassanin"}},"title":"Egyptian women artisans: ICTs are not the entry to modern markets.","venue":"HCC","pages":"179-190","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Hassanin08","doi":"10.1007/978-0-387-84822-8_12","ee":"https://doi.org/10.1007/978-0-387-84822-8_12","url":"https://dblp.org/rec/conf/hcc/Hassanin08"}, "url":"URL#5353702" }, { "@score":"1", "@id":"5353703", "info":{"authors":{"author":{"@pid":"83/960","text":"Magda David Hercheui"}},"title":"Governmental policies for ICT diffusion and leadership legitimacy in grassroots movements.","venue":"HCC","pages":"275-286","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Hercheui08","doi":"10.1007/978-0-387-84822-8_18","ee":"https://doi.org/10.1007/978-0-387-84822-8_18","url":"https://dblp.org/rec/conf/hcc/Hercheui08"}, "url":"URL#5353703" }, { "@score":"1", "@id":"5353704", "info":{"authors":{"author":{"@pid":"70/3215","text":"Roohollah Honarvar"}},"title":"Lessons from a dropped ICT curriculum design project: A retrospective view.","venue":"HCC","pages":"241-252","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Honarvar08","doi":"10.1007/978-0-387-84822-8_16","ee":"https://doi.org/10.1007/978-0-387-84822-8_16","url":"https://dblp.org/rec/conf/hcc/Honarvar08"}, "url":"URL#5353704" }, { "@score":"1", "@id":"5353705", "info":{"authors":{"author":[{"@pid":"44/4164","text":"Jainaba M. L. Kah"},{"@pid":"81/1565","text":"Muhammadou M. O. Kah"}]},"title":"ICT and socio-economic development: A university's engagement in a rural community in Yola, Nigeria.","venue":"HCC","pages":"223-239","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/KahK08","doi":"10.1007/978-0-387-84822-8_15","ee":"https://doi.org/10.1007/978-0-387-84822-8_15","url":"https://dblp.org/rec/conf/hcc/KahK08"}, "url":"URL#5353705" }, { "@score":"1", "@id":"5353706", "info":{"authors":{"author":{"@pid":"53/4255","text":"Kai Kimppa"}},"title":"A no-IPR model as solution to reuse and understanding of information systems.","venue":"HCC","pages":"319-325","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Kimppa08","doi":"10.1007/978-0-387-84822-8_21","ee":"https://doi.org/10.1007/978-0-387-84822-8_21","url":"https://dblp.org/rec/conf/hcc/Kimppa08"}, "url":"URL#5353706" }, { "@score":"1", "@id":"5353707", "info":{"authors":{"author":{"@pid":"23/307","text":"Mathias Klang"}},"title":"Open access barriers: An action research.","venue":"HCC","pages":"335-348","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Klang08","doi":"10.1007/978-0-387-84822-8_23","ee":"https://doi.org/10.1007/978-0-387-84822-8_23","url":"https://dblp.org/rec/conf/hcc/Klang08"}, "url":"URL#5353707" }, { "@score":"1", "@id":"5353708", "info":{"authors":{"author":{"@pid":"38/4080","text":"Robin Mansell"}},"title":"Communication, information, and ICT policy: Enabling research frameworks.","venue":"HCC","pages":"15-28","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Mansell08","doi":"10.1007/978-0-387-84822-8_2","ee":"https://doi.org/10.1007/978-0-387-84822-8_2","url":"https://dblp.org/rec/conf/hcc/Mansell08"}, "url":"URL#5353708" }, { "@score":"1", "@id":"5353709", "info":{"authors":{"author":{"@pid":"46/1577","text":"Mpostol Jeremia Mashinini"}},"title":"Challenges of ICT policy for rural communities: A case study from South Africa.","venue":"HCC","pages":"125-137","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Mashinini08","doi":"10.1007/978-0-387-84822-8_9","ee":"https://doi.org/10.1007/978-0-387-84822-8_9","url":"https://dblp.org/rec/conf/hcc/Mashinini08"}, "url":"URL#5353709" }, { "@score":"1", "@id":"5353710", "info":{"authors":{"author":[{"@pid":"08/1193","text":"Kathy McGrath"},{"@pid":"57/618","text":"Jane Hendy"},{"@pid":"08/216","text":"Ela Klecun"},{"@pid":"92/1534","text":"Leslie P. Willcocks"},{"@pid":"76/2494","text":"Terry Young"}]},"title":"Evaluating "Connecting for Health": Policy implications of a UK mega-programme.","venue":"HCC","pages":"357-362","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/McGrathHKWY08","doi":"10.1007/978-0-387-84822-8_25","ee":"https://doi.org/10.1007/978-0-387-84822-8_25","url":"https://dblp.org/rec/conf/hcc/McGrathHKWY08"}, "url":"URL#5353710" }, { "@score":"1", "@id":"5353711", "info":{"authors":{"author":[{"@pid":"49/586","text":"Gianluca Miscione"},{"@pid":"62/4877","text":"Dorothy Gordon"},{"@pid":"73/3394","text":"Kevin A. Johnston"}]},"title":"Free and Open Source Software in low-income countries: Emergent properties?","venue":"HCC","pages":"351-355","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MiscioneGJ08","doi":"10.1007/978-0-387-84822-8_24","ee":"https://doi.org/10.1007/978-0-387-84822-8_24","url":"https://dblp.org/rec/conf/hcc/MiscioneGJ08"}, "url":"URL#5353711" }, { "@score":"1", "@id":"5353712", "info":{"authors":{"author":[{"@pid":"09/1293","text":"Olga Morawczynski"},{"@pid":"49/586","text":"Gianluca Miscione"}]},"title":"Examining trust in mobile banking transactions: The case of M-PESA in Kenya.","venue":"HCC","pages":"287-298","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/MorawczynskiM08","doi":"10.1007/978-0-387-84822-8_19","ee":"https://doi.org/10.1007/978-0-387-84822-8_19","url":"https://dblp.org/rec/conf/hcc/MorawczynskiM08"}, "url":"URL#5353712" }, { "@score":"1", "@id":"5353713", "info":{"authors":{"author":{"@pid":"24/949","text":"Anouk Mukherjee"}},"title":"Measuring information societies: A critical study of the Infostate framework.","venue":"HCC","pages":"327-334","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Mukherjee08","doi":"10.1007/978-0-387-84822-8_22","ee":"https://doi.org/10.1007/978-0-387-84822-8_22","url":"https://dblp.org/rec/conf/hcc/Mukherjee08"}, "url":"URL#5353713" }, { "@score":"1", "@id":"5353714", "info":{"authors":{"author":{"@pid":"28/3249","text":"Jackie Phahlamohlaka"}},"title":"Globalisation and national security issues for the state: Implications for national ICT policies.","venue":"HCC","pages":"95-107","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Phahlamohlaka08","doi":"10.1007/978-0-387-84822-8_7","ee":"https://doi.org/10.1007/978-0-387-84822-8_7","url":"https://dblp.org/rec/conf/hcc/Phahlamohlaka08"}, "url":"URL#5353714" }, { "@score":"1", "@id":"5353715", "info":{"authors":{"author":{"@pid":"79/3336","text":"Farid Shirazi"}},"title":"Social networks within filtered ICT networks: A case study of the growth of internet usage within Iran.","venue":"HCC","pages":"299-317","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Shirazi08","doi":"10.1007/978-0-387-84822-8_20","ee":"https://doi.org/10.1007/978-0-387-84822-8_20","url":"https://dblp.org/rec/conf/hcc/Shirazi08"}, "url":"URL#5353715" }, { "@score":"1", "@id":"5353716", "info":{"authors":{"author":[{"@pid":"25/881","text":"Matthew L. Smith"},{"@pid":"92/5948","text":"Peter van den Besselaar"},{"@pid":"52/1581","text":"Chrisanthi Avgerou"}]},"title":"Human choice and ICT policy: Introduction to the HCC8 Conference proceedings.","venue":"HCC","pages":"1-13","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SmithBA08","doi":"10.1007/978-0-387-84822-8_1","ee":"https://doi.org/10.1007/978-0-387-84822-8_1","url":"https://dblp.org/rec/conf/hcc/SmithBA08"}, "url":"URL#5353716" }, { "@score":"1", "@id":"5353717", "info":{"authors":{"author":{"@pid":"64/687","text":"Bernd Carsten Stahl"}},"title":"Empowerment through ICT: A critical discourse analysis of the Egyptian ICT policy.","venue":"HCC","pages":"161-177","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Stahl08","doi":"10.1007/978-0-387-84822-8_11","ee":"https://doi.org/10.1007/978-0-387-84822-8_11","url":"https://dblp.org/rec/conf/hcc/Stahl08"}, "url":"URL#5353717" }, { "@score":"1", "@id":"5353718", "info":{"authors":{"author":{"@pid":"54/4281","text":"Panayiota Tsatsou"}},"title":"Digital divides and the role of policy and regulation: a qualitative study.","venue":"HCC","pages":"141-160","year":"2008","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Tsatsou08","doi":"10.1007/978-0-387-84822-8_10","ee":"https://doi.org/10.1007/978-0-387-84822-8_10","url":"https://dblp.org/rec/conf/hcc/Tsatsou08"}, "url":"URL#5353718" }, { "@score":"1", "@id":"5430124", "info":{"authors":{"author":[{"@pid":"52/1581","text":"Chrisanthi Avgerou"},{"@pid":"25/881","text":"Matthew L. Smith"},{"@pid":"92/5948","text":"Peter van den Besselaar"}]},"title":"Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008","venue":["HCC","IFIP"],"volume":"282","publisher":"Springer","year":"2008","type":"Editorship","access":"unavailable","key":"conf/hcc/2008","url":"https://dblp.org/rec/conf/hcc/2008"}, "url":"URL#5430124" }, { "@score":"1", "@id":"5732726", "info":{"authors":{"author":{"@pid":"66/7002","text":"Gunilla Bradley"}},"title":"Social Informatics - From Theory to Actions for the Good ICT Society.","venue":"HCC","pages":"383-394","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Bradley06","doi":"10.1007/978-0-387-37876-3_30","ee":"https://doi.org/10.1007/978-0-387-37876-3_30","url":"https://dblp.org/rec/conf/hcc/Bradley06"}, "url":"URL#5732726" }, { "@score":"1", "@id":"5732727", "info":{"authors":{"author":[{"@pid":"55/10961","text":"Gian Marco Campagnolo"},{"@pid":"29/3438","text":"Gianni Jacucci"}]},"title":"Designing the Accountability of Enterprise Architectures.","venue":"HCC","pages":"355-366","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CampagnoloJ06","doi":"10.1007/978-0-387-37876-3_28","ee":"https://doi.org/10.1007/978-0-387-37876-3_28","url":"https://dblp.org/rec/conf/hcc/CampagnoloJ06"}, "url":"URL#5732727" }, { "@score":"1", "@id":"5732728", "info":{"authors":{"author":[{"@pid":"148/0147","text":"Corinne Chevrot"},{"@pid":"148/0170","text":"Emmanuelle Comtat"},{"@pid":"148/0149","text":"Gwenaël Navarette"},{"@pid":"148/0087","text":"Bruno Oudet"},{"@pid":"148/0119","text":"Jean-Pierre Pinet"}]},"title":"Internet in the Street Project: Helping the Extremely Poor to Enter the Information Society.","venue":"HCC","pages":"309-318","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/ChevrotCNOP06","doi":"10.1007/978-0-387-37876-3_25","ee":"https://doi.org/10.1007/978-0-387-37876-3_25","url":"https://dblp.org/rec/conf/hcc/ChevrotCNOP06"}, "url":"URL#5732728" }, { "@score":"1", "@id":"5732729", "info":{"authors":{"author":{"@pid":"93/5362","text":"Göran Collste"}},"title":"The Ethics of e-Medicine.","venue":"HCC","pages":"101-109","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Collste06","doi":"10.1007/978-0-387-37876-3_8","ee":"https://doi.org/10.1007/978-0-387-37876-3_8","url":"https://dblp.org/rec/conf/hcc/Collste06"}, "url":"URL#5732729" }, { "@score":"1", "@id":"5732730", "info":{"authors":{"author":[{"@pid":"93/5362","text":"Göran Collste"},{"@pid":"62/6521","text":"Penny Duquenoy"},{"@pid":"93/4697","text":"Carlisle Eldwidge George"},{"@pid":"29/581","text":"Karin Hedström"},{"@pid":"53/4255","text":"Kai Kimppa"},{"@pid":"30/6607","text":"Emilio Mordini"}]},"title":"ICT in Medicine and Health Care: Assessing Social, Ethical and Legal Issues.","venue":"HCC","pages":"297-308","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/CollsteDGHKM06","doi":"10.1007/978-0-387-37876-3_24","ee":"https://doi.org/10.1007/978-0-387-37876-3_24","url":"https://dblp.org/rec/conf/hcc/CollsteDGHKM06"}, "url":"URL#5732730" }, { "@score":"1", "@id":"5732731", "info":{"authors":{"author":[{"@pid":"68/6347","text":"Elisabeth Davenport"},{"@pid":"35/6911","text":"Keith S. Horton"}]},"title":"The Production of Service in the Digital City: A Social Informatics Inquiry.","venue":"HCC","pages":"233-242","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/DavenportH06","doi":"10.1007/978-0-387-37876-3_19","ee":"https://doi.org/10.1007/978-0-387-37876-3_19","url":"https://dblp.org/rec/conf/hcc/DavenportH06"}, "url":"URL#5732731" }, { "@score":"1", "@id":"5732732", "info":{"authors":{"author":{"@pid":"89/5313","text":"Tom Dedeurwaerdere"}},"title":"Databases, Biological Information and Collective Action.","venue":"HCC","pages":"159-169","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Dedeurwaerdere06","doi":"10.1007/978-0-387-37876-3_13","ee":"https://doi.org/10.1007/978-0-387-37876-3_13","url":"https://dblp.org/rec/conf/hcc/Dedeurwaerdere06"}, "url":"URL#5732732" }, { "@score":"1", "@id":"5732733", "info":{"authors":{"author":{"@pid":"148/0212","text":"Simon Delakorda"}},"title":"Models of Democracy and the Design of Slovenian Political Party Web Sites.","venue":"HCC","pages":"279-295","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Delakorda06","doi":"10.1007/978-0-387-37876-3_23","ee":"https://doi.org/10.1007/978-0-387-37876-3_23","url":"https://dblp.org/rec/conf/hcc/Delakorda06"}, "url":"URL#5732733" }, { "@score":"1", "@id":"5732734", "info":{"authors":{"author":{"@pid":"49/305","text":"William H. Dutton"}},"title":"The Social Informatics of the Internet: An Ecology of Games.","venue":"HCC","pages":"243-253","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Dutton06","doi":"10.1007/978-0-387-37876-3_20","ee":"https://doi.org/10.1007/978-0-387-37876-3_20","url":"https://dblp.org/rec/conf/hcc/Dutton06"}, "url":"URL#5732734" }, { "@score":"1", "@id":"5732735", "info":{"authors":{"author":{"@pid":"38/9034","text":"Marie Eneman"}},"title":"Digital Child Pornography: Reflections on the Need for a Critical IS Research Agenda.","venue":"HCC","pages":"111-121","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Eneman06","doi":"10.1007/978-0-387-37876-3_9","ee":"https://doi.org/10.1007/978-0-387-37876-3_9","url":"https://dblp.org/rec/conf/hcc/Eneman06"}, "url":"URL#5732735" }, { "@score":"1", "@id":"5732736", "info":{"authors":{"author":[{"@pid":"96/7707","text":"Per Flensburg"},{"@pid":"27/6203","text":"Arianit Kurti"}]},"title":"Social Informatics in the Future?","venue":"HCC","pages":"87-96","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/FlensburgK06","doi":"10.1007/978-0-387-37876-3_7","ee":"https://doi.org/10.1007/978-0-387-37876-3_7","url":"https://dblp.org/rec/conf/hcc/FlensburgK06"}, "url":"URL#5732736" }, { "@score":"1", "@id":"5732737", "info":{"authors":{"author":{"@pid":"20/3558","text":"Klaus Fuchs-Kittowski"}},"title":"Strategies for the Effective Integration of ICT into Social Organization - Organization of Information Processing and the Necessity of Social Informatics.","venue":"HCC","pages":"431-444","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Fuchs-Kittowski06","doi":"10.1007/978-0-387-37876-3_34","ee":"https://doi.org/10.1007/978-0-387-37876-3_34","url":"https://dblp.org/rec/conf/hcc/Fuchs-Kittowski06"}, "url":"URL#5732737" }, { "@score":"1", "@id":"5732738", "info":{"authors":{"author":{"@pid":"97/4649-2","text":"Christian Fuchs 0002"}},"title":"Sustainability and the Information Society.","venue":"HCC","pages":"219-230","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Fuchs06","doi":"10.1007/978-0-387-37876-3_18","ee":"https://doi.org/10.1007/978-0-387-37876-3_18","url":"https://dblp.org/rec/conf/hcc/Fuchs06"}, "url":"URL#5732738" }, { "@score":"1", "@id":"5732739", "info":{"authors":{"author":{"@pid":"52/6302","text":"Pertti Järvinen"}},"title":"On Similarities and Differences between Social Informatics and Information Systems.","venue":"HCC","pages":"395-406","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Jarvinen06","doi":"10.1007/978-0-387-37876-3_31","ee":"https://doi.org/10.1007/978-0-387-37876-3_31","url":"https://dblp.org/rec/conf/hcc/Jarvinen06"}, "url":"URL#5732739" }, { "@score":"1", "@id":"5732740", "info":{"authors":{"author":[{"@pid":"80/620","text":"László Z. Karvalics"},{"@pid":"148/0052","text":"Lilla Juhász"}]},"title":"Teaching Social Informatics for Engineering Students.","venue":"HCC","pages":"65-72","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/KarvalicsJ06","doi":"10.1007/978-0-387-37876-3_5","ee":"https://doi.org/10.1007/978-0-387-37876-3_5","url":"https://dblp.org/rec/conf/hcc/KarvalicsJ06"}, "url":"URL#5732740" }, { "@score":"1", "@id":"5732741", "info":{"authors":{"author":{"@pid":"23/307","text":"Mathias Klang"}},"title":"Virtual Censorship: Controlling the Public Sphere.","venue":"HCC","pages":"185-194","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Klang06","doi":"10.1007/978-0-387-37876-3_15","ee":"https://doi.org/10.1007/978-0-387-37876-3_15","url":"https://dblp.org/rec/conf/hcc/Klang06"}, "url":"URL#5732741" }, { "@score":"1", "@id":"5732742", "info":{"authors":{"author":{"@pid":"148/0140","text":"Pia Krakowski"}},"title":"ICT and Free Open Source Software in Developing Countries.","venue":"HCC","pages":"319-330","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Krakowski06","doi":"10.1007/978-0-387-37876-3_26","ee":"https://doi.org/10.1007/978-0-387-37876-3_26","url":"https://dblp.org/rec/conf/hcc/Krakowski06"}, "url":"URL#5732742" }, { "@score":"1", "@id":"5732743", "info":{"authors":{"author":{"@pid":"78/7091","text":"Paul B. de Laat"}},"title":"Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.","venue":"HCC","pages":"171-183","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Laat06","doi":"10.1007/978-0-387-37876-3_14","ee":"https://doi.org/10.1007/978-0-387-37876-3_14","url":"https://dblp.org/rec/conf/hcc/Laat06"}, "url":"URL#5732743" }, { "@score":"1", "@id":"5732744", "info":{"authors":{"author":{"@pid":"84/1800","text":"Vasileios Laopodis"}},"title":"Communicating Information Society Related RTD and Deployment Results in Support of EU Public Policies.","venue":"HCC","pages":"195-207","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Laopodis06","doi":"10.1007/978-0-387-37876-3_16","ee":"https://doi.org/10.1007/978-0-387-37876-3_16","url":"https://dblp.org/rec/conf/hcc/Laopodis06"}, "url":"URL#5732744" }, { "@score":"1", "@id":"5732745", "info":{"authors":{"author":[{"@pid":"58/7205","text":"Yu-Wei Lin"},{"@pid":"67/345","text":"Enrico Zini"}]},"title":"An Empirical Study on Implementing Free/Libre Open Source Software (FLOSS) in Schools.","venue":"HCC","pages":"123-132","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/LinZ06","doi":"10.1007/978-0-387-37876-3_10","ee":"https://doi.org/10.1007/978-0-387-37876-3_10","url":"https://dblp.org/rec/conf/hcc/LinZ06"}, "url":"URL#5732745" }, { "@score":"1", "@id":"5732746", "info":{"authors":{"author":{"@pid":"44/5227","text":"Katarina Lindblad-Gidlund"}},"title":"User's Knights in Shining Armour?","venue":"HCC","pages":"265-278","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Lindblad-Gidlund06","doi":"10.1007/978-0-387-37876-3_22","ee":"https://doi.org/10.1007/978-0-387-37876-3_22","url":"https://dblp.org/rec/conf/hcc/Lindblad-Gidlund06"}, "url":"URL#5732746" }, { "@score":"1", "@id":"5732747", "info":{"authors":{"author":[{"@pid":"148/0145","text":"Françoise Massit-Folléa"},{"@pid":"148/0085","text":"Cécile Méadel"}]},"title":"Consumer Models in the Encounter between Supply and Demand of Electronic Administration.","venue":"HCC","pages":"209-217","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Massit-FolleaM06","doi":"10.1007/978-0-387-37876-3_17","ee":"https://doi.org/10.1007/978-0-387-37876-3_17","url":"https://dblp.org/rec/conf/hcc/Massit-FolleaM06"}, "url":"URL#5732747" }, { "@score":"1", "@id":"5732748", "info":{"authors":{"author":{"@pid":"54/7253","text":"Eric T. Meyer"}},"title":"Socio-Technical Interaction Networks: A Discussion of the Strengths, Weaknesses and Future of Kling's STIN Model.","venue":"HCC","pages":"37-48","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Meyer06","doi":"10.1007/978-0-387-37876-3_3","ee":"https://doi.org/10.1007/978-0-387-37876-3_3","url":"https://dblp.org/rec/conf/hcc/Meyer06"}, "url":"URL#5732748" }, { "@score":"1", "@id":"5732749", "info":{"authors":{"author":{"@pid":"92/1127","text":"Olof Nilsson"}},"title":"A User Centred Access Model.","venue":"HCC","pages":"445-455","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Nilsson06","doi":"10.1007/978-0-387-37876-3_35","ee":"https://doi.org/10.1007/978-0-387-37876-3_35","url":"https://dblp.org/rec/conf/hcc/Nilsson06"}, "url":"URL#5732749" }, { "@score":"1", "@id":"5732750", "info":{"authors":{"author":{"@pid":"04/605","text":"Markku I. Nurminen"}},"title":"Work Informatics - An Operationalisation of Social Informatics.","venue":"HCC","pages":"407-416","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Nurminen06","doi":"10.1007/978-0-387-37876-3_32","ee":"https://doi.org/10.1007/978-0-387-37876-3_32","url":"https://dblp.org/rec/conf/hcc/Nurminen06"}, "url":"URL#5732750" }, { "@score":"1", "@id":"5732751", "info":{"authors":{"author":[{"@pid":"149/2899","text":"Rocío Rueda Ortiz"},{"@pid":"75/2094","text":"Henrik Herlau"},{"@pid":"48/4195","text":"Leif Bloch Rasmussen"}]},"title":"Philosophical Inquiry into Social Informatics - Methods and Uses of Language.","venue":"HCC","pages":"417-430","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/OrtizHR06","doi":"10.1007/978-0-387-37876-3_33","ee":"https://doi.org/10.1007/978-0-387-37876-3_33","url":"https://dblp.org/rec/conf/hcc/OrtizHR06"}, "url":"URL#5732751" }, { "@score":"1", "@id":"5732752", "info":{"authors":{"author":{"@pid":"23/4847","text":"Giuseppina Pellegrino"}},"title":"Ubiquity and Pervasivity: On the Technological Mediation of (Mobile) Everyday Life.","venue":"HCC","pages":"133-144","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Pellegrino06","doi":"10.1007/978-0-387-37876-3_11","ee":"https://doi.org/10.1007/978-0-387-37876-3_11","url":"https://dblp.org/rec/conf/hcc/Pellegrino06"}, "url":"URL#5732752" }, { "@score":"1", "@id":"5732753", "info":{"authors":{"author":{"@pid":"41/7523","text":"Pille Pruulmann-Vengerfeldt"}},"title":"Computers and Internet Related Beliefs among Estonian Computer Users and Non-Users.","venue":"HCC","pages":"459-468","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Pruulmann-Vengerfeldt06","doi":"10.1007/978-0-387-37876-3_36","ee":"https://doi.org/10.1007/978-0-387-37876-3_36","url":"https://dblp.org/rec/conf/hcc/Pruulmann-Vengerfeldt06"}, "url":"URL#5732753" }, { "@score":"1", "@id":"5732754", "info":{"authors":{"author":[{"@pid":"48/4195","text":"Leif Bloch Rasmussen"},{"@pid":"63/8511","text":"Viktoria Skarler"}]},"title":"Priorities of Fair Globalization.","venue":"HCC","pages":"483-486","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/RasmussenS06","doi":"10.1007/978-0-387-37876-3_38","ee":"https://doi.org/10.1007/978-0-387-37876-3_38","url":"https://dblp.org/rec/conf/hcc/RasmussenS06"}, "url":"URL#5732754" }, { "@score":"1", "@id":"5732755", "info":{"authors":{"author":[{"@pid":"47/478","text":"Alice Robbin"},{"@pid":"29/2716","text":"Ron Day"}]},"title":"On Rob Kling: The Theoretical, the Methodological, and the Critical.","venue":"HCC","pages":"25-36","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/RobbinD06","doi":"10.1007/978-0-387-37876-3_2","ee":"https://doi.org/10.1007/978-0-387-37876-3_2","url":"https://dblp.org/rec/conf/hcc/RobbinD06"}, "url":"URL#5732755" }, { "@score":"1", "@id":"5732756", "info":{"authors":{"author":[{"@pid":"47/478","text":"Alice Robbin"},{"@pid":"l/RobertaLamb","text":"Roberta Lamb"},{"@pid":"k/JohnLeslieKing","text":"John Leslie King"},{"@pid":"78/3792","text":"Jacques Berleur"}]},"title":"As we may remember.","venue":"HCC","pages":"17-21","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/RobbinLKB06","doi":"10.1007/978-0-387-37876-3_1","ee":"https://doi.org/10.1007/978-0-387-37876-3_1","url":"https://dblp.org/rec/conf/hcc/RobbinLKB06"}, "url":"URL#5732756" }, { "@score":"1", "@id":"5732757", "info":{"authors":{"author":[{"@pid":"44/6261","text":"Steve Sawyer"},{"@pid":"18/4411","text":"Michael Tyworth"}]},"title":"Social Informatics: Principles, Theory, and Practice.","venue":"HCC","pages":"49-62","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SawyerT06","doi":"10.1007/978-0-387-37876-3_4","ee":"https://doi.org/10.1007/978-0-387-37876-3_4","url":"https://dblp.org/rec/conf/hcc/SawyerT06"}, "url":"URL#5732757" }, { "@score":"1", "@id":"5732758", "info":{"authors":{"author":{"@pid":"81/249","text":"Rudi Schmiede"}},"title":"Knowledge, Work and Subject in Informational Capitalism.","venue":"HCC","pages":"333-354","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Schmiede06","doi":"10.1007/978-0-387-37876-3_27","ee":"https://doi.org/10.1007/978-0-387-37876-3_27","url":"https://dblp.org/rec/conf/hcc/Schmiede06"}, "url":"URL#5732758" }, { "@score":"1", "@id":"5732759", "info":{"authors":{"author":[{"@pid":"148/0162","text":"Edouard J. Simon"},{"@pid":"j/MoniqueJanneck","text":"Monique Janneck"},{"@pid":"75/7921","text":"Dorina Gumm"}]},"title":"Understanding Socio-Technical Change: Towards a Multidisciplinary Approach.","venue":"HCC","pages":"469-479","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/SimonJG06","doi":"10.1007/978-0-387-37876-3_37","ee":"https://doi.org/10.1007/978-0-387-37876-3_37","url":"https://dblp.org/rec/conf/hcc/SimonJG06"}, "url":"URL#5732759" }, { "@score":"1", "@id":"5732760", "info":{"authors":{"author":[{"@pid":"140/6500","text":"Tuija Tiihonen"},{"@pid":"94/6959","text":"Mikko Korpela"},{"@pid":"79/3899","text":"Anja Mursu"}]},"title":"Creating a Framework to Recognize Context-Originated Factors in IS in Organizations.","venue":"HCC","pages":"367-379","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/TiihonenKM06","doi":"10.1007/978-0-387-37876-3_29","ee":"https://doi.org/10.1007/978-0-387-37876-3_29","url":"https://dblp.org/rec/conf/hcc/TiihonenKM06"}, "url":"URL#5732760" }, { "@score":"1", "@id":"5732761", "info":{"authors":{"author":[{"@pid":"04/308","text":"Tanja Urbancic"},{"@pid":"42/5621","text":"Olga Stepánková"},{"@pid":"l/NadaLavrac","text":"Nada Lavrac"}]},"title":"Enhancing Human Choice by Information Technologies.","venue":"HCC","pages":"255-264","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/UrbancicSL06","doi":"10.1007/978-0-387-37876-3_21","ee":"https://doi.org/10.1007/978-0-387-37876-3_21","url":"https://dblp.org/rec/conf/hcc/UrbancicSL06"}, "url":"URL#5732761" }, { "@score":"1", "@id":"5732762", "info":{"authors":{"author":[{"@pid":"26/1310","text":"Antonino Vaccaro"},{"@pid":"38/2344","text":"Peter Madsen"}]},"title":"Firm Information Transparency: Ethical Questions in the Information Age.","venue":"HCC","pages":"145-156","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/VaccaroM06","doi":"10.1007/978-0-387-37876-3_12","ee":"https://doi.org/10.1007/978-0-387-37876-3_12","url":"https://dblp.org/rec/conf/hcc/VaccaroM06"}, "url":"URL#5732762" }, { "@score":"1", "@id":"5732763", "info":{"authors":{"author":{"@pid":"10/4956","text":"Vasja Vehovar"}},"title":"Social Informatics: An Emerging Discipline?","venue":"HCC","pages":"73-85","year":"2006","type":"Conference and Workshop Papers","access":"open","key":"conf/hcc/Vehovar06","doi":"10.1007/978-0-387-37876-3_6","ee":"https://doi.org/10.1007/978-0-387-37876-3_6","url":"https://dblp.org/rec/conf/hcc/Vehovar06"}, "url":"URL#5732763" }, { "@score":"1", "@id":"5801166", "info":{"authors":{"author":[{"@pid":"78/3792","text":"Jacques Berleur"},{"@pid":"04/605","text":"Markku I. Nurminen"},{"@pid":"94/2730","text":"John Impagliazzo"}]},"title":"Social Informatics: An Information Society for all? In Remembrance of Rob Kling - Proceedings of the Seventh International Conference on Human Choice and Computers (HCC7), IFIP TC 9, Maribor, Slovenia, September 21-23, 2006","venue":["HCC","IFIP"],"volume":"223","publisher":"Springer","year":"2006","type":"Editorship","key":"conf/hcc/2006","doi":"10.1007/978-0-387-37876-3","ee":"https://doi.org/10.1007/978-0-387-37876-3","url":"https://dblp.org/rec/conf/hcc/2006"}, "url":"URL#5801166" }, { "@score":"1", "@id":"6275555", "info":{"authors":{"author":[{"@pid":"14/4567","text":"Abiodun O. Bada"},{"@pid":"93/4460","text":"Manny C. Aniebonam"},{"@pid":"62/2012","text":"Vesper Owei"}]},"title":"Adapting Global Practices Locally: A Perspective on IT Implementation in a Developing Country Context.","venue":"HCC","pages":"239-251","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/BadaAO02","url":"https://dblp.org/rec/conf/hcc/BadaAO02"}, "url":"URL#6275555" }, { "@score":"1", "@id":"6275556", "info":{"authors":{"author":[{"@pid":"78/3792","text":"Jacques Berleur"},{"@pid":"03/1870","text":"Tanguy Ewbank de Wespin"}]},"title":"Self-regulation: Content, Legitimacy and Efficiency - Governance and Ethics.","venue":"HCC","pages":"89-108","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/BerleurW02","url":"https://dblp.org/rec/conf/hcc/BerleurW02"}, "url":"URL#6275556" }, { "@score":"1", "@id":"6275557", "info":{"authors":{"author":[{"@pid":"b/PeterBittner","text":"Peter Bittner"},{"@pid":"82/4973","text":"Eva Hornecker"}]},"title":"Responsibility and the Work of IT-Professionals: From Academia to Practice.","venue":"HCC","pages":"171-181","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/BittnerH02","url":"https://dblp.org/rec/conf/hcc/BittnerH02"}, "url":"URL#6275557" }, { "@score":"1", "@id":"6275558", "info":{"authors":{"author":{"@pid":"66/7002","text":"Gunilla Bradley"}},"title":"Theoretical Perspective on the Interplay Between ICT and Quality of Life.","venue":"HCC","pages":"31-41","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Bradley02","url":"https://dblp.org/rec/conf/hcc/Bradley02"}, "url":"URL#6275558" }, { "@score":"1", "@id":"6275559", "info":{"authors":{"author":{"@pid":"92/1058","text":"Arslan Brömme"}},"title":"A Classification of Biometric Applications Wanted by Politics: Passorts, Person Tracking and Fight Against Terror.","venue":"HCC","pages":"207-219","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Bromme02","url":"https://dblp.org/rec/conf/hcc/Bromme02"}, "url":"URL#6275559" }, { "@score":"1", "@id":"6275560", "info":{"authors":{"author":[{"@pid":"12/6021","text":"Andrew Clement"},{"@pid":"59/760","text":"Robert Guerra"},{"@pid":"98/6746","text":"Jeff Johnson"},{"@pid":"36/2739","text":"Felix Stalder"}]},"title":"National Identification Schemes (Nids): A Remedy Against Terrorist Attack?","venue":"HCC","pages":"195-205","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/ClementGJS02","url":"https://dblp.org/rec/conf/hcc/ClementGJS02"}, "url":"URL#6275560" }, { "@score":"1", "@id":"6275561", "info":{"authors":{"author":{"@pid":"17/1783","text":"Wolfgang Coy"}},"title":"Computer Augmented Research and Scientific Misconduct.","venue":"HCC","pages":"131-146","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Coy02","url":"https://dblp.org/rec/conf/hcc/Coy02"}, "url":"URL#6275561" }, { "@score":"1", "@id":"6275562", "info":{"authors":{"author":{"@pid":"89/5313","text":"Tom Dedeurwaerdere"}},"title":"Ethics and Learning - From State Regulation towards Reflexive Self-Regulation of the Information Society.","venue":"HCC","pages":"121-130","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Dedeurwaerdere02","url":"https://dblp.org/rec/conf/hcc/Dedeurwaerdere02"}, "url":"URL#6275562" }, { "@score":"1", "@id":"6275563", "info":{"authors":{"author":[{"@pid":"57/2705","text":"Carolyn Dowling"},{"@pid":"59/2187","text":"Paul Nicholson"}]},"title":"Choice and Responsibility: The Delegation of Decision Making to Intelligent Software Agents.","venue":"HCC","pages":"163-170","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/DowlingN02","url":"https://dblp.org/rec/conf/hcc/DowlingN02"}, "url":"URL#6275563" }, { "@score":"1", "@id":"6275564", "info":{"authors":{"author":[{"@pid":"f/SimoneFischerHubner","text":"Simone Fischer-Hübner"},{"@pid":"78/6463","text":"Alberto Escudero-Pascual"},{"@pid":"78/3345","text":"Helena Lindskog"}]},"title":"Preventing Privacy Attacks and CyberCrime in the Mobile Internet?","venue":"HCC","pages":"221-223","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Fischer-HuebnerPL02","url":"https://dblp.org/rec/conf/hcc/Fischer-HuebnerPL02"}, "url":"URL#6275564" }, { "@score":"1", "@id":"6275565", "info":{"authors":{"author":[{"@pid":"20/3558","text":"Klaus Fuchs-Kittowski"},{"@pid":"52/4738","text":"Frank Fuchs-Kittowski"}]},"title":"Quality of Working Life, Knowledge-Intensive Work Processes and Creative Learning Organisations: Information Processing Paradigm versus Self-Organisation Theory.","venue":"HCC","pages":"265-274","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Fuchs-KittowskiF02","url":"https://dblp.org/rec/conf/hcc/Fuchs-KittowskiF02"}, "url":"URL#6275565" }, { "@score":"1", "@id":"6275566", "info":{"authors":{"author":{"@pid":"g/CCGotlieb","text":"C. C. Gotlieb"}},"title":"Does the Internet Promote Democracy?","venue":"HCC","pages":"21-29","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Gotlieb02","url":"https://dblp.org/rec/conf/hcc/Gotlieb02"}, "url":"URL#6275566" }, { "@score":"1", "@id":"6275567", "info":{"authors":{"author":{"@pid":"36/6947","text":"Lorenz M. Hilty"}},"title":"Sustainable Development and the Information Society.","venue":"HCC","pages":"305-315","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Hilty02","url":"https://dblp.org/rec/conf/hcc/Hilty02"}, "url":"URL#6275567" }, { "@score":"1", "@id":"6275568", "info":{"authors":{"author":{"@pid":"80/620","text":"László Z. Karvalics"}},"title":"The Security Aspect of Information Society as a Global Biocultural System.","venue":"HCC","pages":"147-162","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Karvalics02","url":"https://dblp.org/rec/conf/hcc/Karvalics02"}, "url":"URL#6275568" }, { "@score":"1", "@id":"6275569", "info":{"authors":{"author":{"@pid":"k/RobKling","text":"Rob Kling"}},"title":"Critical Professional Discourses About Information and Communications Technologies and Social Life in the U.S..","venue":"HCC","pages":"1-20","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Kling02","url":"https://dblp.org/rec/conf/hcc/Kling02"}, "url":"URL#6275569" }, { "@score":"1", "@id":"6275570", "info":{"authors":{"author":{"@pid":"l/JohnANLee","text":"John A. N. Lee"}},"title":"Some Great Myths of the History of Computing.","venue":"HCC","pages":"61-75","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Lee02","url":"https://dblp.org/rec/conf/hcc/Lee02"}, "url":"URL#6275570" }, { "@score":"1", "@id":"6275571", "info":{"authors":{"author":[{"@pid":"83/1726","text":"Martina Sophia Lundin"},{"@pid":"48/4195","text":"Leif Bloch Rasmussen"}]},"title":"A Radical Scandinavian ("Øresundsk") Approach to Inquiring Organizations - A Critique of ICY in Knowledge Management.","venue":"HCC","pages":"293-304","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/LundinR02","url":"https://dblp.org/rec/conf/hcc/LundinR02"}, "url":"URL#6275571" }, { "@score":"1", "@id":"6275572", "info":{"authors":{"author":{"@pid":"54/5538","text":"Adekunle Okunoye"}},"title":"Towards a Framework for Sustainable Knowledge Management in Organisations in Developing Countries.","venue":"HCC","pages":"225-237","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Okunoye02","url":"https://dblp.org/rec/conf/hcc/Okunoye02"}, "url":"URL#6275572" }, { "@score":"1", "@id":"6275573", "info":{"authors":{"author":[{"@pid":"87/5266","text":"Marcos Clayton Pessoa"},{"@pid":"97/7714","text":"Joaquim Celestino Jr."},{"@pid":"60/4318","text":"Sandra Maciel Barreto"},{"@pid":"69/3233","text":"José Carvalho Filho Jr."}]},"title":"Using Technology to help the Citizen Enrollment.","venue":"HCC","pages":"43-53","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/PessoaCBF02","url":"https://dblp.org/rec/conf/hcc/PessoaCBF02"}, "url":"URL#6275573" }, { "@score":"1", "@id":"6275574", "info":{"authors":{"author":[{"@pid":"10/5437","text":"Philippe Quéau"},{"@pid":"00/5690","text":"Boyan Radoykov"},{"@pid":"10/3642","text":"Axel Plathe"}]},"title":""Information for All" Programme.","venue":"HCC","pages":"317-318","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/QueauRP02","url":"https://dblp.org/rec/conf/hcc/QueauRP02"}, "url":"URL#6275574" }, { "@score":"1", "@id":"6275575", "info":{"authors":{"author":{"@pid":"01/5669","text":"Richard S. Rosenberg"}},"title":"Is the Enemy Us? - New Threats to Privacy, Freedom of Information and Civil Liberties in the Age of Terrorism.","venue":"HCC","pages":"183-194","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Rosenberg02","url":"https://dblp.org/rec/conf/hcc/Rosenberg02"}, "url":"URL#6275575" }, { "@score":"1", "@id":"6275576", "info":{"authors":{"author":{"@pid":"s/BrittaSchinzel","text":"Britta Schinzel"}},"title":"Cultural Differences of Female Enrollment in Tertiary Education in Computer Science.","venue":"HCC","pages":"283-292","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Schinzel02","url":"https://dblp.org/rec/conf/hcc/Schinzel02"}, "url":"URL#6275576" }, { "@score":"1", "@id":"6275577", "info":{"authors":{"author":{"@pid":"83/2856","text":"Andy Sloane"}},"title":"Information and Communication Technology and the Home Environment.","venue":"HCC","pages":"55-60","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Sloane02","url":"https://dblp.org/rec/conf/hcc/Sloane02"}, "url":"URL#6275577" }, { "@score":"1", "@id":"6275578", "info":{"authors":{"author":[{"@pid":"83/4885","text":"Arthur Tatnall"},{"@pid":"89/1927","text":"Bill Davey"}]},"title":"Understanding the Process of Information Systems and ICT Curriculum Development. Three Models.","venue":"HCC","pages":"275-282","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/TatnallD02","url":"https://dblp.org/rec/conf/hcc/TatnallD02"}, "url":"URL#6275578" }, { "@score":"1", "@id":"6275579", "info":{"authors":{"author":[{"@pid":"16/4709","text":"Mathura Prasad Thapliyal"},{"@pid":"69/4822","text":"K. Subramanian"}]},"title":"Technology and Learning Societies in the New Millennium (Indian Context): Content, Practice and Management.","venue":"HCC","pages":"253-263","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/ThapliyalS02","url":"https://dblp.org/rec/conf/hcc/ThapliyalS02"}, "url":"URL#6275579" }, { "@score":"1", "@id":"6275580", "info":{"authors":{"author":{"@pid":"98/4558","text":"Kurt Walk"}},"title":"Roots of Computing in Austria - Contributions of the IBM Vienna Laboratory and Changes of Paradigms and Priorities in Information Technology.","venue":"HCC","pages":"77-87","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Walk02","url":"https://dblp.org/rec/conf/hcc/Walk02"}, "url":"URL#6275580" }, { "@score":"1", "@id":"6275581", "info":{"authors":{"author":{"@pid":"88/5423","text":"John Weckert"}},"title":"Trust, Corruption, and Surveillance in the Electronic Workplace.","venue":"HCC","pages":"109-119","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Weckert02","url":"https://dblp.org/rec/conf/hcc/Weckert02"}, "url":"URL#6275581" }, { "@score":"1", "@id":"6275582", "info":{"title":"Draft Recommendations "Concerning the Promotion and Use of Multilingualism and Universal Access to Cyberspace".","venue":"HCC","pages":"319-327","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/X02","url":"https://dblp.org/rec/conf/hcc/X02"}, "url":"URL#6275582" }, { "@score":"1", "@id":"6312915", "info":{"authors":{"author":[{"@pid":"55/4367","text":"Klaus Brunnstein"},{"@pid":"78/3792","text":"Jacques Berleur"}]},"title":"Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society, IFIP 17th World Computer Congress - TC9 Stream / 6th International Conference on Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society (HCC-6), August 25-30, 2002, Montréal, Québec, Canada","venue":["HCC","IFIP Conference Proceedings"],"volume":"225","publisher":"Kluwer","year":"2002","type":"Editorship","access":"unavailable","key":"conf/hcc/2002","url":"https://dblp.org/rec/conf/hcc/2002"}, "url":"URL#6312915" }, { "@score":"1", "@id":"6481168", "info":{"authors":{"author":[{"@pid":"48/4195","text":"Leif Bloch Rasmussen"},{"@pid":"45/1333","text":"Colin Beardon"},{"@pid":"74/5938","text":"Silvio Munari"}]},"title":"Computers and Networks in the Age of Globalization, IFIP TC9 World Conference on Human Choice and Computers, August 25-28, 1998, Geneva, Switzerland","venue":["HCC","IFIP Conference Proceedings"],"volume":"185","publisher":"Kluwer","year":"2000","type":"Editorship","access":"unavailable","key":"conf/hcc/1998","url":"https://dblp.org/rec/conf/hcc/1998"}, "url":"URL#6481168" }, { "@score":"1", "@id":"6593885", "info":{"authors":{"author":{"@pid":"45/1333","text":"Colin Beardon"}},"title":"Six works of art and their significance for the future of computing.","venue":"HCC","pages":"345-360","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Beardon98","url":"https://dblp.org/rec/conf/hcc/Beardon98"}, "url":"URL#6593885" }, { "@score":"1", "@id":"6593886", "info":{"authors":{"author":{"@pid":"78/3792","text":"Jacques Berleur"}},"title":"Ethics and the governance of the internet: Recommendations of IFIP - SIG 9.2.2.","venue":"HCC","pages":"141-154","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Berleur98","url":"https://dblp.org/rec/conf/hcc/Berleur98"}, "url":"URL#6593886" }, { "@score":"1", "@id":"6593887", "info":{"authors":{"author":{"@pid":"50/1816","text":"Kresten Bjerg"}},"title":"Towards the virtual home: Construing the multimedia-home to enhance cultural and biographic continuity.","venue":"HCC","pages":"307-318","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Bjerg98","url":"https://dblp.org/rec/conf/hcc/Bjerg98"}, "url":"URL#6593887" }, { "@score":"1", "@id":"6593888", "info":{"authors":{"author":[{"@pid":"55/3003","text":"Ruud van Dael"},{"@pid":"12/4623","text":"Carolien Metselaar"}]},"title":"The computing profession in the era of virtual organising.","venue":"HCC","pages":"187-200","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/DaelM98","url":"https://dblp.org/rec/conf/hcc/DaelM98"}, "url":"URL#6593888" }, { "@score":"1", "@id":"6593889", "info":{"authors":{"author":[{"@pid":"81/757","text":"Niklas Damiris"},{"@pid":"63/125","text":"Helga Wild"}]},"title":"Concerning the virtual in the real.","venue":"HCC","pages":"335-344","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/DamirisW98","url":"https://dblp.org/rec/conf/hcc/DamirisW98"}, "url":"URL#6593889" }, { "@score":"1", "@id":"6593890", "info":{"authors":{"author":{"@pid":"64/418","text":"Phillip L. Davidson"}},"title":"Shifting values in information technologies.","venue":"HCC","pages":"71-84","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Davidson98","url":"https://dblp.org/rec/conf/hcc/Davidson98"}, "url":"URL#6593890" }, { "@score":"1", "@id":"6593891", "info":{"authors":{"author":[{"@pid":"62/6521","text":"Penny Duquenoy"},{"@pid":"78/5618","text":"Diane Whitehouse"}]},"title":"The process of ethics.","venue":"HCC","pages":"361-380","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/DuquenoyW98","url":"https://dblp.org/rec/conf/hcc/DuquenoyW98"}, "url":"URL#6593891" }, { "@score":"1", "@id":"6593892", "info":{"authors":{"author":{"@pid":"96/2367","text":"Tom Dwyer"}},"title":"New social actors in the context of a developing country: Computerisation in Brazil.","venue":"HCC","pages":"319-334","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Dwyer98","url":"https://dblp.org/rec/conf/hcc/Dwyer98"}, "url":"URL#6593892" }, { "@score":"1", "@id":"6593893", "info":{"authors":{"author":[{"@pid":"82/5388","text":"Morten Falch"},{"@pid":"20/5336","text":"Anders Henten"},{"@pid":"61/5522","text":"Knud Erik Skouby"}]},"title":"Consumer related legal aspects of electronic commerce: The case of Denmark.","venue":"HCC","pages":"103-114","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/FalchHS98","url":"https://dblp.org/rec/conf/hcc/FalchHS98"}, "url":"URL#6593893" }, { "@score":"1", "@id":"6593894", "info":{"authors":{"author":{"@pid":"71/4611","text":"Michal Golinski"}},"title":"The valuation of the Polish information infrastructure development level in comparison with other selected countries.","venue":"HCC","pages":"169-186","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Golinski98","url":"https://dblp.org/rec/conf/hcc/Golinski98"}, "url":"URL#6593894" }, { "@score":"1", "@id":"6593895", "info":{"authors":{"author":[{"@pid":"42/2288","text":"Kirsi Heiskanen"},{"@pid":"79/181","text":"Mikko Jäkälä"},{"@pid":"28/4591","text":"Samuli Pekkola"}]},"title":"Visualisation of communication in collaborative virtual environments.","venue":"HCC","pages":"231-244","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/HeiskanenJP98","url":"https://dblp.org/rec/conf/hcc/HeiskanenJP98"}, "url":"URL#6593895" }, { "@score":"1", "@id":"6593896", "info":{"authors":{"author":[{"@pid":"00/2512","text":"Kai Jakobs"},{"@pid":"67/6530","text":"Rob Procter"},{"@pid":"28/1226","text":"Robin Williams"}]},"title":"Standardisation, innovation and implementation of information technology.","venue":"HCC","pages":"201-220","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/JakobsPW98","url":"https://dblp.org/rec/conf/hcc/JakobsPW98"}, "url":"URL#6593896" }, { "@score":"1", "@id":"6593897", "info":{"authors":{"author":{"@pid":"52/6302","text":"Pertti Järvinen"}},"title":"Improving the quality of drawings.","venue":"HCC","pages":"245-260","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Jarvinen98","url":"https://dblp.org/rec/conf/hcc/Jarvinen98"}, "url":"URL#6593897" }, { "@score":"1", "@id":"6593898", "info":{"authors":{"author":[{"@pid":"12/6626","text":"Luc Jeandenans"},{"@pid":"42/4624","text":"Michel Gautero"},{"@pid":"75/2876","text":"François Grize"},{"@pid":"24/2319","text":"Igor V. Tetko"},{"@pid":"30/5697","text":"Alessandro E. P. Villa"}]},"title":"Computer assisted neurophysiology by a distributed JAVA program.","venue":"HCC","pages":"261-272","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/JeandenansGGTV98","url":"https://dblp.org/rec/conf/hcc/JeandenansGGTV98"}, "url":"URL#6593898" }, { "@score":"1", "@id":"6593899", "info":{"authors":{"author":{"@pid":"84/1800","text":"Vassilios Laopodis"}},"title":"Public interest issues in the global information society: Is there a role for public authorities?","venue":"HCC","pages":"155-168","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Laopodis98","url":"https://dblp.org/rec/conf/hcc/Laopodis98"}, "url":"URL#6593899" }, { "@score":"1", "@id":"6593900", "info":{"authors":{"author":{"@pid":"32/99","text":"Marc van Lieshout"}},"title":"The exclusive society - elderly people and ICT.","venue":"HCC","pages":"3-22","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Lieshout98","url":"https://dblp.org/rec/conf/hcc/Lieshout98"}, "url":"URL#6593900" }, { "@score":"1", "@id":"6593901", "info":{"authors":{"author":[{"@pid":"o/VeronikaOechtering","text":"Veronika Oechtering"},{"@pid":"34/671","text":"Karin Vosseberg"}]},"title":"Informatica feminale: A place for educational experiences.","venue":"HCC","pages":"39-54","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/OechteringV98","url":"https://dblp.org/rec/conf/hcc/OechteringV98"}, "url":"URL#6593901" }, { "@score":"1", "@id":"6593902", "info":{"authors":{"author":{"@pid":"22/6282","text":"Richard F. Paweska"}},"title":"A new model for integrated computing science undergraduate education.","venue":"HCC","pages":"61-70","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Paweska98","url":"https://dblp.org/rec/conf/hcc/Paweska98"}, "url":"URL#6593902" }, { "@score":"1", "@id":"6593903", "info":{"authors":{"author":[{"@pid":"08/1702","text":"Jane Retvig"},{"@pid":"75/2094","text":"Henrik Herlau"},{"@pid":"48/4195","text":"Leif Bloch Rasmussen"}]},"title":"Signs of exformation systems.","venue":"HCC","pages":"381-396","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/RetvigHR98","url":"https://dblp.org/rec/conf/hcc/RetvigHR98"}, "url":"URL#6593903" }, { "@score":"1", "@id":"6593904", "info":{"authors":{"author":[{"@pid":"32/4642","text":"Kathrin Schier"},{"@pid":"f/SimoneFischerHubner","text":"Simone Fischer-Hübner"}]},"title":"The global information society and electronic commerce: Privacy threats and privacy technologies.","venue":"HCC","pages":"115-134","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/SchierF98","url":"https://dblp.org/rec/conf/hcc/SchierF98"}, "url":"URL#6593904" }, { "@score":"1", "@id":"6593905", "info":{"authors":{"author":{"@pid":"83/2856","text":"Andy Sloane"}},"title":"Infrastructure issues for internet broadcasting to home-based users.","venue":"HCC","pages":"221-230","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Sloane98","url":"https://dblp.org/rec/conf/hcc/Sloane98"}, "url":"URL#6593905" }, { "@score":"1", "@id":"6593906", "info":{"authors":{"author":{"@pid":"24/3260","text":"Suzanne Spradley"}},"title":"Telemedicine: The future of medicine - a case study of telemedicine applications within the United States.","venue":"HCC","pages":"291-306","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Spradley98","url":"https://dblp.org/rec/conf/hcc/Spradley98"}, "url":"URL#6593906" }, { "@score":"1", "@id":"6593907", "info":{"authors":{"author":[{"@pid":"12/4700","text":"Lorraine Staehr"},{"@pid":"325/1191","text":"Mary B. Martin"},{"@pid":"72/3312","text":"Graeme Byrne"}]},"title":"An intervention programme for women in computing courses: Does it make a difference?","venue":"HCC","pages":"23-38","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/StaehrMB98","url":"https://dblp.org/rec/conf/hcc/StaehrMB98"}, "url":"URL#6593907" }, { "@score":"1", "@id":"6593908", "info":{"authors":{"author":{"@pid":"51/271","text":"Jean-François Vibert"}},"title":"XNBC: Simulating biological neural networks.","venue":"HCC","pages":"273-290","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Vibert98","url":"https://dblp.org/rec/conf/hcc/Vibert98"}, "url":"URL#6593908" }, { "@score":"1", "@id":"6593909", "info":{"authors":{"author":{"@pid":"13/394","text":"Gunnar Wenngren"}},"title":"The SUSEC school project: Introducing computer security to teachers and pupils.","venue":"HCC","pages":"55-60","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Wenngren98","url":"https://dblp.org/rec/conf/hcc/Wenngren98"}, "url":"URL#6593909" }, { "@score":"1", "@id":"6593910", "info":{"authors":{"author":{"@pid":"34/2711","text":"Weiping Zheng"}},"title":"The world wide web and the dilution of the Chinese language.","venue":"HCC","pages":"135-140","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/Zheng98","url":"https://dblp.org/rec/conf/hcc/Zheng98"}, "url":"URL#6593910" }, { "@score":"1", "@id":"6593911", "info":{"authors":{"author":{"@pid":"42/6809","text":"Marie d'Udekem-Gevers"}},"title":"Belgian 'digital cities': A sample of French-speaking websites.","venue":"HCC","pages":"85-102","year":"1998","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/hcc/dUdekem-Gevers98","url":"https://dblp.org/rec/conf/hcc/dUdekem-Gevers98"}, "url":"URL#6593911" } ] } } } )