the Web tools have been used as a means of dissemination and mobile as a means of voting and counting to hold the first International Digital Direct Election - ID2E. This article aims to describe the ID2E performed in order to test the viability for the international voting by mobiles using SMS protocol, using Web 2.0 tools to facilitate discussions about the election main theme.
Participative local democracy: Possibilities with new technologiesDaniel Gracia
In this report I examine the possibilities t offered by new technologies, such as the Internet, informatics devices and telecommunications, to improve legitimacy. I will be focusing specially in local institutions, like the city council of Illescas. Due this space allows implementing these tools faster with less cost and risk. From this point, I distinguish four fields in which new technologies may be used in order to reach a remarkable political participation: 1) elections, 2) referendums, 3) transparency, and 4) legislative initiative. However, before assessing the possibilities of new technologies in the field of local democracy; I determine the requirements to succeed in our idea.
The Cyberspace and Intensification of Privacy Invasioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
In general, electronic voting as the technology advancement offers the opportunities to reduce the
time and budget of implementation which present the greater advantages than traditional approach. It
seeks establish the privacy framework in the context of electronic voting that aligns with the mutual
comprehension of relevant factors and measures. The result found that privacy concern and perceived
benefit have influenced personal data protection significantly. The success and failure of electronic voting
implementation depend on the fulfilment of the voter needs on privacy and personal data protection.
Participative local democracy: Possibilities with new technologiesDaniel Gracia
In this report I examine the possibilities t offered by new technologies, such as the Internet, informatics devices and telecommunications, to improve legitimacy. I will be focusing specially in local institutions, like the city council of Illescas. Due this space allows implementing these tools faster with less cost and risk. From this point, I distinguish four fields in which new technologies may be used in order to reach a remarkable political participation: 1) elections, 2) referendums, 3) transparency, and 4) legislative initiative. However, before assessing the possibilities of new technologies in the field of local democracy; I determine the requirements to succeed in our idea.
The Cyberspace and Intensification of Privacy Invasioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
In general, electronic voting as the technology advancement offers the opportunities to reduce the
time and budget of implementation which present the greater advantages than traditional approach. It
seeks establish the privacy framework in the context of electronic voting that aligns with the mutual
comprehension of relevant factors and measures. The result found that privacy concern and perceived
benefit have influenced personal data protection significantly. The success and failure of electronic voting
implementation depend on the fulfilment of the voter needs on privacy and personal data protection.
How to social scientists use link data (11 june2010)Han Woo PARK
The author would like to thank Bernie Horgan, Rob Ackland, Jeong-Soo Seo, and Yeon-ok Lee for their helpful comments on an earlier draft. Part of this research was carried out during the author’s stay at the Oxford Internet Institute. During the preparation of final manuscript, this research is supported from the WCU project granted from South Korean Government. This paper has been presented at the 2010 International Communication Association conference held in Singapore. http://www.icahdq.org/conferences/2010/
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
Seminar given in Barcelona, November 20th, 2007 at the Executive Master in e-Governance, École Polytechnique Fédérale de Lausanne.
http://ictlogy.net/bibciter/reports/projects.php?idp=801
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
The number of mobile Internet users has been growing rapidly worldwide. Access to the Internet
via mobile cellular networks has also grown rapidly. The effects of different culture of mobile Internet would be interesting to be investigated. The research objective is to investigate the usage pattern differences of mobile Internet users in Indonesia and Japan and to interpret them within the framework of a value structure. The data collection technique used in this study was the survey method. The same questionnaire written in mother language of each country was given to respondents in Japan and Indonesia directly. The result shows that value structures (functional value, emotional value, social value, and monetary value) simultaneously affect the satisfaction of mobile Internet usage of Indonesian respondents, which affect the satisfaction of Japanese respondents. Social value did not
significantly affect the satisfaction of mobile Internet usage of Japanese respondents. The implications of cross-cultural differences of mobile Internet will be discussed in this paper. This paper will be ended with discussion, conclusion with practical implications and limitations.
Internet voting: Will communities decide?marcoadria
This presentation considers potential methods for communities to help shape and influence the decision as to whether Internet voting will be adopted. In particular, a case study will be presented of the use of the public-involvement method of a Citizen Jury to deliberate on the question of whether Internet voting should be adopted. It is argued that because considerations other than public opinion, such as the interests of stakeholders and the influence of mass and online media in framing of issues, will continue to affect the opinions of elected representatives, community-informatics theorists and practitioners should develop innovative methods of ensuring that the voice of citizens can be meaningfully incorporated into the decision as to whether Internet voting will be adopted.
At this time, e-governance transformation is considered as one of the most important and biggest challenges among
and within the IT-related sector from the scale and complexity perspective. In this respect, the researches have
reviewed and studied some of the factors that affect implementing the e-governance for Public and private schools in
Governorate of Al Buraimi, Oman. The aim of the study was to determine whether there existed organizational
differences that demanded different approaches and strategies for the implementation of e-governance. The research
considered three organizational factors, which included, the type of the organization (public or private), size of the
organization and the work experience of the employees of the organization. In addition, the research considered the
some of the requirements needed for the implementation of e-governance. These requirements included, physical,
financial, administrative and management requirements. Through the research it was evident that the different types
of requirements needed for the implementation of e-governance varied by the organizational factors. In other words,
the findings indicated that the approaches and strategies that needs to be adopted will differ with the organizational
characteristics. This differences needs to be considered at the time of implementation and should be incorporated
when developing the implementation plans by the implementing organization
Including the Excluded Can ICTs empower poor communities? Towards an alternat...Soren Gigler
nder which conditions can information and communications technologies (ICTs) empower poor communities? This paper investigates this question, focusing on the role of information and communications technologies in promoting indigenous people's development in Latin America. First, the paper analyzes key factors under which information and knowledge can be instrumental and substantive for the empowerment of marginalized groups. Hereby, we argue that improved access to information and ICT skills, similar to the enhancement of a person's writing and reading skills, can enhance poor peoples' capabilities to make strategic life choices and to achieve the lifestyle they value. Furthermore, the paper develops an alternative evaluation framework for ICT interventions based on Sen's capability approach. This framework places, in contrast to the current discourse around the "digital divide", the human development of the poor and not technology at the center of the analysis. The paper concludes that there does not exist a direct and causal relationship between ICTs and empowerment, but that in fact this relationship is being shaped by a dynamic, multi-dimensional interrelationship between technology and the social context.
Information and communications
technologies (ICTs) are different tools
and technologies to transmit information
and communicate with the community
(one to one or in groups). Through the
use of computers and interconnected
networks it provides a feasible and
accurate platform to increase the mobility
of information for different issues and
exchange of knowledge.
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...IJERA Editor
This chapter analyzes the unique problems posed by the use of computers by producers and performers of music
as far as Human Computer Interaction (HCI) principles, methodologies and directives are concerned. In specific
it focuses on interfaces that are built on mobile devices or similar medical equipment. HCI predicates involved in
the workflow of aural interaction with computer devices are presented, starting from the abstract part of
neurotologic interaction, then coping with usability issues of the Graphical User Interfaces (GUIs) implemented
for musical scripting and concluding to a synthesis stage which produces digitized sounds that improve or
supersede prototypal analog audio signals. The evaluation of HCI elements for Computer Music under the prism
of usability, including hearing or ophthalmic aids, aims at the development of new communication tools, new
symbolic languages and finally better mobile user interfaces.
Interoperability issues for the Deployment of Unified Communications and Inte...idescitation
Access to information holds the key to the empowerment of everybody despite where they are living. This
research is to be carried out in respect of the people living in
developing countries, considering their plight and complex
geographical, demographic, social-economic conditions
surrounding the areas they live, which hinder access to
information and of professionals providing services such as
medical workers, which has led to high death rates and
development
stagnation.
Research
on
Unified
Communications and Integrated Collaborations (UCIC)
system in the health sector of developing countries comes in
to create a possible solution of bridging the digital canyon
among the communities. The aim is to deliver services in a
seamless manner to assist health workers situated anywhere
to be accessed easily and access information which will help
in service delivery. The proposed UCIC system provides the
most immersive telepresence experience for one-to-one or
many-to-many meetings. Extending to locations anywhere in
the world, the transformative platform delivers Ultra-low
operating costs through the use of general purpose networks
and using special lenses and track systems. The aim of this
paper is to identify the interoperability issues anticipated in
the deployment of the UCIC system in the health sector of
developing countries and recommend possible solutions. These
recommendations once adopted and implemented correctly
will bring enhancement to the speed and quality of services
offered by health workers. The capacities of UCIC will help
health workers shorten decision cycles, accelerate service
delivery and save lives by speeding access to information and
by making it possible for all health workers and patients to
collaborate everywhere
Exploring Factors Relating to the Use of E-Government Services, as Perceived ...Abdullah Mohammed
From as early as 1999, the Government of Trinidad and Tobago recognized the positive benefits that ICT could bring to its operations, to the private sector, and to its citizens. Since then, much work has been done to lay the foundations for e-Government and e-Business. Although the potential benefits are high, progress has been slow, and because of this, citizens have had little exposure to local e-Government and e-Commerce service offerings.
This study takes a first look at the factors that would affect Trinidad and Tobago citizens’ intentions to use an online, transactional e-Government service using constructs from the Technology Acceptance Model (Davis 1989), the Diffusions of Innovations Theory (Rogers 1995), two forms of Trust (Carter and Bélanger 2005), and user characteristics. Hypothesis testing revealed that the six constructs in the model were significantly correlated with use intentions, along with three other demographic variables. Interestingly, Gender, Age and Agent assistance were not found to be statistically significant. Findings from correlations, the factor analysis and the multiple regression model were presented, and the implications for e-Government leaders and project implementers are discussed.
How to social scientists use link data (11 june2010)Han Woo PARK
The author would like to thank Bernie Horgan, Rob Ackland, Jeong-Soo Seo, and Yeon-ok Lee for their helpful comments on an earlier draft. Part of this research was carried out during the author’s stay at the Oxford Internet Institute. During the preparation of final manuscript, this research is supported from the WCU project granted from South Korean Government. This paper has been presented at the 2010 International Communication Association conference held in Singapore. http://www.icahdq.org/conferences/2010/
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
Seminar given in Barcelona, November 20th, 2007 at the Executive Master in e-Governance, École Polytechnique Fédérale de Lausanne.
http://ictlogy.net/bibciter/reports/projects.php?idp=801
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
The number of mobile Internet users has been growing rapidly worldwide. Access to the Internet
via mobile cellular networks has also grown rapidly. The effects of different culture of mobile Internet would be interesting to be investigated. The research objective is to investigate the usage pattern differences of mobile Internet users in Indonesia and Japan and to interpret them within the framework of a value structure. The data collection technique used in this study was the survey method. The same questionnaire written in mother language of each country was given to respondents in Japan and Indonesia directly. The result shows that value structures (functional value, emotional value, social value, and monetary value) simultaneously affect the satisfaction of mobile Internet usage of Indonesian respondents, which affect the satisfaction of Japanese respondents. Social value did not
significantly affect the satisfaction of mobile Internet usage of Japanese respondents. The implications of cross-cultural differences of mobile Internet will be discussed in this paper. This paper will be ended with discussion, conclusion with practical implications and limitations.
Internet voting: Will communities decide?marcoadria
This presentation considers potential methods for communities to help shape and influence the decision as to whether Internet voting will be adopted. In particular, a case study will be presented of the use of the public-involvement method of a Citizen Jury to deliberate on the question of whether Internet voting should be adopted. It is argued that because considerations other than public opinion, such as the interests of stakeholders and the influence of mass and online media in framing of issues, will continue to affect the opinions of elected representatives, community-informatics theorists and practitioners should develop innovative methods of ensuring that the voice of citizens can be meaningfully incorporated into the decision as to whether Internet voting will be adopted.
At this time, e-governance transformation is considered as one of the most important and biggest challenges among
and within the IT-related sector from the scale and complexity perspective. In this respect, the researches have
reviewed and studied some of the factors that affect implementing the e-governance for Public and private schools in
Governorate of Al Buraimi, Oman. The aim of the study was to determine whether there existed organizational
differences that demanded different approaches and strategies for the implementation of e-governance. The research
considered three organizational factors, which included, the type of the organization (public or private), size of the
organization and the work experience of the employees of the organization. In addition, the research considered the
some of the requirements needed for the implementation of e-governance. These requirements included, physical,
financial, administrative and management requirements. Through the research it was evident that the different types
of requirements needed for the implementation of e-governance varied by the organizational factors. In other words,
the findings indicated that the approaches and strategies that needs to be adopted will differ with the organizational
characteristics. This differences needs to be considered at the time of implementation and should be incorporated
when developing the implementation plans by the implementing organization
Including the Excluded Can ICTs empower poor communities? Towards an alternat...Soren Gigler
nder which conditions can information and communications technologies (ICTs) empower poor communities? This paper investigates this question, focusing on the role of information and communications technologies in promoting indigenous people's development in Latin America. First, the paper analyzes key factors under which information and knowledge can be instrumental and substantive for the empowerment of marginalized groups. Hereby, we argue that improved access to information and ICT skills, similar to the enhancement of a person's writing and reading skills, can enhance poor peoples' capabilities to make strategic life choices and to achieve the lifestyle they value. Furthermore, the paper develops an alternative evaluation framework for ICT interventions based on Sen's capability approach. This framework places, in contrast to the current discourse around the "digital divide", the human development of the poor and not technology at the center of the analysis. The paper concludes that there does not exist a direct and causal relationship between ICTs and empowerment, but that in fact this relationship is being shaped by a dynamic, multi-dimensional interrelationship between technology and the social context.
Information and communications
technologies (ICTs) are different tools
and technologies to transmit information
and communicate with the community
(one to one or in groups). Through the
use of computers and interconnected
networks it provides a feasible and
accurate platform to increase the mobility
of information for different issues and
exchange of knowledge.
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...IJERA Editor
This chapter analyzes the unique problems posed by the use of computers by producers and performers of music
as far as Human Computer Interaction (HCI) principles, methodologies and directives are concerned. In specific
it focuses on interfaces that are built on mobile devices or similar medical equipment. HCI predicates involved in
the workflow of aural interaction with computer devices are presented, starting from the abstract part of
neurotologic interaction, then coping with usability issues of the Graphical User Interfaces (GUIs) implemented
for musical scripting and concluding to a synthesis stage which produces digitized sounds that improve or
supersede prototypal analog audio signals. The evaluation of HCI elements for Computer Music under the prism
of usability, including hearing or ophthalmic aids, aims at the development of new communication tools, new
symbolic languages and finally better mobile user interfaces.
Interoperability issues for the Deployment of Unified Communications and Inte...idescitation
Access to information holds the key to the empowerment of everybody despite where they are living. This
research is to be carried out in respect of the people living in
developing countries, considering their plight and complex
geographical, demographic, social-economic conditions
surrounding the areas they live, which hinder access to
information and of professionals providing services such as
medical workers, which has led to high death rates and
development
stagnation.
Research
on
Unified
Communications and Integrated Collaborations (UCIC)
system in the health sector of developing countries comes in
to create a possible solution of bridging the digital canyon
among the communities. The aim is to deliver services in a
seamless manner to assist health workers situated anywhere
to be accessed easily and access information which will help
in service delivery. The proposed UCIC system provides the
most immersive telepresence experience for one-to-one or
many-to-many meetings. Extending to locations anywhere in
the world, the transformative platform delivers Ultra-low
operating costs through the use of general purpose networks
and using special lenses and track systems. The aim of this
paper is to identify the interoperability issues anticipated in
the deployment of the UCIC system in the health sector of
developing countries and recommend possible solutions. These
recommendations once adopted and implemented correctly
will bring enhancement to the speed and quality of services
offered by health workers. The capacities of UCIC will help
health workers shorten decision cycles, accelerate service
delivery and save lives by speeding access to information and
by making it possible for all health workers and patients to
collaborate everywhere
Exploring Factors Relating to the Use of E-Government Services, as Perceived ...Abdullah Mohammed
From as early as 1999, the Government of Trinidad and Tobago recognized the positive benefits that ICT could bring to its operations, to the private sector, and to its citizens. Since then, much work has been done to lay the foundations for e-Government and e-Business. Although the potential benefits are high, progress has been slow, and because of this, citizens have had little exposure to local e-Government and e-Commerce service offerings.
This study takes a first look at the factors that would affect Trinidad and Tobago citizens’ intentions to use an online, transactional e-Government service using constructs from the Technology Acceptance Model (Davis 1989), the Diffusions of Innovations Theory (Rogers 1995), two forms of Trust (Carter and Bélanger 2005), and user characteristics. Hypothesis testing revealed that the six constructs in the model were significantly correlated with use intentions, along with three other demographic variables. Interestingly, Gender, Age and Agent assistance were not found to be statistically significant. Findings from correlations, the factor analysis and the multiple regression model were presented, and the implications for e-Government leaders and project implementers are discussed.
The Digital Divide Revisited Opportunity for all requires som.docxmehek4
The Digital Divide Revisited
"Opportunity for all requires something else today -- having access to a computer and knowing how to use it. That means we must close the digital divide between those who've got the tools and those who don't" (Clinton, 2000)
Even before President Clinton began a series of initiatives targeting the digital divide, the National Telecommunications and Information Administration (NTIA) began surveying internet usage in the U.S., focusing on the "haves" versus the "have nots" as those terms referred to households or groups with access to computers and the internet. Although there is ongoing discussion about the ways and means of measuring the size of the gap, both in the U.S. and worldwide, generally the indicators of availability, access and utilization of Communications Technologies (ICTs) and the ICT Development Index (IDI)1 are used in research to determine the "gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access information and communication technologies and to their use of the Internet for a wide variety of activities” (Understanding the Digital Divide, 2001).
1 The ICT Development Index (IDI) is an index published by the United Nations International Telecommunication Union based on internationally agreed information and communication technologies (ICT) indicators.
The 2014 IDI report lists the United States as ranking 14th among 166 countries surveyed (up from 17th in 2012) (International Telecommunication Union, 2015). What are some of the indicators that are used to assess availability, access, and utilization of the internet? In a research study completed at the School of Business, University of Redlands (Pick, Sarkar, & Johnson, 2015), three areas of concentration are identified. First are the demographic factors. As might be expected, urban locations have the heaviest concentration of broadband access (high speed internet access) and mobile phone availability. Individual internet use in metropolitan areas varies along racial and ethnic lines. Rural residents are significantly less likely to access the Internet than urban and suburban residents. Housing density and people's socializing interactions also impact internet usage. We will discuss the impact of socializing factors later.
Second, economic factors, that is, income has been a significant factor in providing access to computers and in internet usage. Employment in professional jobs and in service industries is strongly associated with technology availability and use.
Third, the level of educational attainment certainly seems to impact both access to and use of the internet. It seems somewhat intuitive to say that the more educated a person, the better understanding that person has of technology and how to use it. In summary,
younger, white, better educated, more affluent, employed, urban and suburban Americans remain more likely to access the I ...
The development of new technologies will enable decentralization and freedom of communication for large numbers of people, by overcoming the barriers that once rendered direct participation of
society unfeasible. The continued development of information and communication technologies (ICT)
makes it possible for people to participate in political life. Today, the use of e-tools is becoming a way of
adapting democracy to the needs of contemporary states and strengthening civil society. The aim of this
paper is to answer questions about the essence of ICT and forms of civic engagement through electronic
forms of participation. The author seeks answers to the following questions: How does ICT influence
political processes? How do electronic communication systems create the conditions for the political engagement of citizens? Can the use of information technologies have a real impact on participation?
EVALUATING CITIZENS' PERCEPTIONS AND ATTITUDES TOWARDS E-VOTING IN LOCAL GOVE...ijmpict
The implementation of Electronic Voting (eVoting) at the local level presents numerous advantages. It
affords citizens the opportunity to participate in the planning and decision-making processes that directly
affect their local communities. Furthermore, eVoting systems promote inclusivity and equality among the
citizenry. Moreover, the adoption of eVoting can enhance transparency and subsequently bolster citizens'
trust in their government. However, it is essential to underscore that the successful implementation of
eVoting is a notably intricate endeavor. The primary objective of this paper is to investigate citizens'
perceptions and attitudes regarding the implementation of eVoting in municipal elections. This research
aims to ascertain the feasibility of introducing eVoting in municipal elections and to identify the key factors
contributing to its successful implementation. To accomplish this, the findings of a study conducted
between May and July of 2023, which involved the participation of residents of the Municipality of
Thessaloniki are presented and analyzed. According to the findings, the eVoting paradigm, if all the
necessary measures are taken and all the necessary conditions for its proper implementation are met, is an
important and useful tool, which can promote e-Democracy and consequently democracy in local
communities.
EVALUATING CITIZENS' PERCEPTIONS AND ATTITUDES TOWARDS E-VOTING IN LOCAL GOVE...ijmpict
The implementation of Electronic Voting (eVoting) at the local level presents numerous advantages. It
affords citizens the opportunity to participate in the planning and decision-making processes that directly
affect their local communities. Furthermore, eVoting systems promote inclusivity and equality among the
citizenry. Moreover, the adoption of eVoting can enhance transparency and subsequently bolster citizens'
trust in their government. However, it is essential to underscore that the successful implementation of
eVoting is a notably intricate endeavor. The primary objective of this paper is to investigate citizens'
perceptions and attitudes regarding the implementation of eVoting in municipal elections. This research
aims to ascertain the feasibility of introducing eVoting in municipal elections and to identify the key factors
contributing to its successful implementation. To accomplish this, the findings of a study conducted
between May and July of 2023, which involved the participation of residents of the Municipality of
Thessaloniki are presented and analyzed. According to the findings, the eVoting paradigm, if all the
necessary measures are taken and all the necessary conditions for its proper implementation are met, is an
important and useful tool, which can promote e-Democracy and consequently democracy in local
communities.
WOMEN AND THE INTERNET - Article(1).pdflinda gichohi
This article explains about how we can leverage on technology; Internet Access to increase and promote women engagement in public participation processes.
Women should become more involved in decision-making to be able to better address the challenges they face.
This Blog also provides the meaning of Public Participation as per the Kenyan laws and decisions by the courts, challenges exhibited and recommendations on how to promote women engagement in public participation suing the Internet and Technology.
Networks for Citizen Consultation and Citizen Sourcing of Expertise: Explor...@cristobalcobo
"New ICTs + New Media = New Democracy? Communications policy and public life in the age of broadband"
Experts’ workshop
New America Foundation, 1899 L St NW, Washington, DC
September 20-22, 2011
www.americanthinktank.net
Cristobal Cobo, Ph.D
Research Fellow
Oxford Internet Institute
University of Oxford
Digital Divide and Digital Inclusive Policies in India: A Sociological Studyijtsrd
The digital divide or digital split is a social issue referring to the differing amount of information between those who have access to internet and those who do not have access to the internet. The term assumes that such an access variance leads to social discrepancies owing to the alterations in the benefit conferred upon those who use this technology and those who do not use it. Digital divide is not merely a concern for developing countries even its a reality for developed countries of the world as well. This occurrence has been gaining attention worldwide for digitally enabled social policies and planning. The Indian government ambitious project, ˜digital India, would be a reality only if it includes the neglected section of the society. The objectives of the paper are: a) to delineate digital divide in India and its concern & b) to ascertain the digital inclusive policies in India.Key Words: Digital divide, Digital opportunity initiatives, digital empowerment etc. Dr. Mohammad Swalehin"Digital Divide and Digital Inclusive Policies in India: A Sociological Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd5901.pdf http://www.ijtsrd.com/humanities-and-the-arts/sociology/5901/digital-divide-and-digital-inclusive-policies-in-india--a-sociological-study/dr-mohammad-swalehin
Digital exclusion as a hindrance to the emergence of the information society:...Przegląd Politologiczny
There is no doubt, that digital transformation (knowledge-based transformation) has
emerged as the crucial megatrend in modern civilization. Artificial intelligence (AI), machines and
autonomous vehicles, the Internet of Things (IoT), financial technology (Fin/Tech), smart investing
and the analysis and processing of big data are the most recent manifestations of this trend, but not
the only ones. All of these phenomena have led to the emergence and continuing development of the
so-called ‘Information Society’ (IS), which refers to a new type of social organization that is clearly
distinct from the earlier forms of society. In this new society, information and knowledge play an
essential role in facilitating the Knowledge-Based Economy (KBE), where information is collected,
transmitted and processed in a faster and more effective manner, and can subsequently be used to
foster accelerated economic growth. Unfortunately, the problem of digital exclusion still occurs, also
in Poland. The author in the conclusion comes to opinion that people who are digitally excluded find
it much more difficult to overcome psychological rather than technical barriers to having access to
the Internet and learning basic computer skills. This situation calls for urgent improvement. In the
modern information society, a lack of basic knowledge about computers translates into partial or total
digital illiteracy and makes it difficult to perform a range of everyday tasks. It is therefore essential
in Poland to prevent digital exclusion. People who do not use the Internet are socially and professionally limited, or virtually handicapped, which results in quantifiable economic losses. This translates to lower creativity and innovativeness and reduced revenue of state budget, and impedes the
competitiveness of the economy and the development of a post-modern, post-industrial social model.
The main research goal is to show the causes of the phenomenon of digital exclusion in Poland and
ways to counteract it. In the course of the research, the most frequently used method was causal and
effect analysis as well as institutional and legal analysis. Elements of the decision-making, historical,
comparative and statistical methods were also used.
Call for papers - International Journal of Managing Public Sector Information...ijmpict
International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT ) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in regards to the use of information and communication technologies (ICT) in the public sector around the world. ICT are becoming fundamental to the operation of government agencies, especially in light of the development of e-government applications and rising citizen expectations.
International Journal of Managing Public Sector Information and Communication...ijmpict
The International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in regards to the use of information and communication technologies (ICT) in the public sector around the world. ICT are becoming fundamental to the operation of government agencies, especially in light of the development of e-government applications and rising citizen expectations. As such, the International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) seeks to establish new collaborations, new best practices, and new theories in public sector organizations around the world in regards to developing, applying, managing, measuring, monitoring, procuring, and securing ICT in governmental operations (including civilian, military, health care and education applications).
Running Head: SOCIAL MEDIA EFFECT 1
SOCIAL MEDIA EFFECT 14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
Introduction
Regulation of social media usage has led to lawmakers, community members, and even the litigators in shaping their policies. This is done based on federal, local, and state laws while also realigning the information that they are sharing online. This is concerning the public safety administration that is usually affected by the continued use of social media platforms. Public safety administration is also based on restricting access to personal information while trying to protect citizens from various issues such as bullying and cybercrime. Social media usage has continued to put more people at risk, and there is a need for the provision of public safety protection by the relevant administrators. This needs to be tied to the generation of federal laws that protect information and data from various individuals that have been posted on social media platforms while encouraging the much-needed transparency in the protection of the public. Continued social media usage by the general public has also brought about the issue of stolen identity due to the emergence of modern technology. The new technology arrival has been the leading cause of the interaction of many people on social media platforms (Beckett, 2018). Those tasked with policymaking have always argued that the administration of public safety should be in line with the duty to protect the privacy or access to information and data from various individuals. In that regard, this paper aims at analyzing the issue of social media usage as it affects the administration of public safety at all times.
Resources
Public safety administration often encompasses the release and coordination of various resources, which can be able to ensure the safety and security of the community as a whole (Gintova, 2018). Administration of public safety is inclusive of many departments such as the police, the emergency services, the medical services, and even the fire department. Public safety administration also happens to be affected by limited resources when it comes to preventing the processes involved from working efficiently. This can be linked to the limiting resources by the government while ensuring the safety and the security of the general public (Baym, 2015). The general public will always rely upon a variety of services that come from the relevant governments to enable the provision of safety and security to the public in their daily lives. However, limited resources will end up hampering the whole process as systems and policies seize to operate with the much-needed efficiency (Wohn & Bowe, 2016).
Public safety administration services hap.
Call for papers - International Journal of Managing Public Sector Information...ijmpict
International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT ) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in regards to the use of information and communication technologies (ICT) in the public sector around the world. ICT are becoming fundamental to the operation of government agencies, especially in light of the development of e-government applications and rising citizen expectations.
Similar to International digital direct election (20)
NOTA DE REPÚDIO EM FAVOR DO PROCURADOR HUGO CÉSAR HOESCHLAngela Iara Zotti
O Sindicato Nacional dos Procuradores da Fazenda Nacional emitiu “nota de desagravo”, firmada por seu presidente Horáclio Mendes de Carvalho Neto, solidarizando-se com o procurador Hugo Cesar Hoeschl, vitima de assédio moral e perseguição pelo Procurador Regional da Fazenda Nacional, com sede em Porto Alegre, José Cyrillo da Silva.
Engajamento de gestores públicos e cidadãos através de uma métrica baseada em...Angela Iara Zotti
Dissertação de mestrado que apresenta um método para a obtenção de uma métrica de engajamento baseada em elementos de gamificação que possa ser aplicada em diferentes contextos, para valorizar a participação do cidadão e de gestores públicos em ambientes colaborativos on-line.
Gamificação para o fortalecimento da cidadania: uma análise da SWAPP mGOV2Angela Iara Zotti
Artigo publicado no 11º Simpósio sobre la Sociedad de la Información - SSI, realizado durante as 42ª JAIIO - Jornadas Argentinas de Informática entre os dias 16 a 20 de setembro, Córdoba, Argentina.
Gestão da Inovação com Sustentabilidade e ConectividadeAngela Iara Zotti
Gerir o conhecimento com sustentabilidade e conectividade é o grande desafio da atualidade. Para criar este livro, os pesquisadores do Instituto i3G buscaram inspiração nos grandes gurus da inovação como Steve Jobs, Prahalad, Clay Christensen, Gonvindarajan, Chris Anderson, e outros mais. Usaram referências de modelos de empresas como a GE, Lego Games, Siemens, Natura e outras. Foi pensando no que o compartilhamento de ideias poderia fazer pelos empreendedores e porque a ótica da sustentabilidade é imprescindível para criar novos produtos e abrir novos mercados.
mGOV2: ENVOLVIMENTO DO CIDADÃO NO DESENVOLVIMENTO DE POLÍTICAS PÚBLICAS COM O...Angela Iara Zotti
The paper presents the design proposal for mgov2 as a technological model based on social networks and mobile devices as a tool to support public policy development at the municipal, state and federal levels, aiming to strengthen citizenship in Latin America and Caribbean - LAC .
Desenvolvimento Sustentado da Inovação apoiado nos conceitos Web 2.0: o caso ...Angela Iara Zotti
Sobre a criação do NIT Virtual e como os recursos colaborativos da Web 2.0 podem auxiliar na disseminação do conhecimento e dar sustentabilidade ao processo da inovação para o Arranjo Produtivo Local Móveis do Planalto Norte Catarinense.
ELEIÇÃO DIRETA DIGITAL INTERNACIONAL - ED²I: uso das ferramentas Web 2.0 com ...Angela Iara Zotti
Este artigo tem como objetivos descrever o processo da ED²I e fazer uma análise do uso das ferramentas Web 2.0 utilizadas com ênfase no Flickr e no Panoramio usados para a gestão da origem dos votos neste processo eleitoral digital.
Publicado em: Revista Democracia Digital e Governo Eletrônico (ISSN 2175-9391), n° 4, p. 57-67, 2011.
Breve análise sobre a forma de divulgação na internet das contas públicas das prefeituras das capitais brasileiras, principalmente quanto à clareza e entendimento à sociedade. Como apoio utilizou um mapa interativo que centraliza em um único ambiente os links de acesso a essas contas públicas para facilitar a busca, visualização, análise e divulgação dessas informações.
Apresentação para secretários municipais de Laguna-SC para mostrar o potencial das redes sociais no planejamento público para a área da saúde, em novembro de 2010.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
1. IADIS International Conference e-Democracy, Equity and Social Justice 2010
INTERNATIONAL DIGITAL DIRECT ELECTION: AN
APPROACH ABOUT COLLABORATION BETWEEN WEB
TOOLS AND MOBILE
Waldoir Valentim Gomes Junior1; Ângela Iara Zotti1,2; Claudia de Oliveira Bueno1,2; Renato
Jorge Prim1 and Hugo Cesar Hoeschl, PhD1,2
1
Programa de Pós-Graduação em Engenharia e Gestão do Conhecimento
Universidade Federal de Santa Catarina. Campus Universitário, Trindade, Florianópolis, Santa Catarina, Brasil.
2
Instituto de Governo Eletrônico, Inteligência e Sistemas – i3G. Rua Lauro Linhares, 728 sl. 105. Trindade,
Florianópolis, Santa Catarina, Brasil.
ABSTRACT
The intense participation of a population to support decisions through participatory democratic process is hampered by a
number of issues such as remote location, infrastructure, availability of time and political organization among the
communities. The Information and Communication Technology (ICT) has emerged as an alternative solution to this
problem. ICT associated with the power of the Internet represent true gear joint operational processes of governments and
nongovernmental entities providing flow of information, services and popular participation. On the one hand the Internet
has democratized access to information for people the mobile has democratized communication. In this sense, the Web
tools have been used as a means of dissemination and mobile as a means of voting and counting to hold the first
International Digital Direct Election - ID2E. This article aims to describe the ID2E performed in order to test the viability
for the international voting by mobiles using SMS protocol, using Web 2.0 tools to facilitate discussions about the
election main theme.
KEYWORDS
Information and communication technologies, digital election, e-democracy, WEB collaborative tools, mobile.
1. INTRODUCTION
Many initiatives have been proposed to participatory democratic processes refer to the Web environment,
making it possible popular participation in the discussion of matters of any kind, giving everyone the power
to opinion and decision.
As a result, a number of tools and web applications are available to assist and expand the e-democracy.
On the one hand the Internet has democratized access to information for people mobile has democratized the
communication. On the Internet, access to a wealth of information is available for a relatively short time to
any User of the system. In the same vein the mobile phone has been providing not only mobility, but rather a
real ability to interact with various technologies that allow leaving literally "the world in our hands."
A few years ago mobile phones, have spread rapidly in most developed countries, however, presents
significant growth in developing or poor countries. Currently there are around 4.1 billion mobile phones, with
China on top in numbers of aircraft in the world, followed by India, the United States and Russia.
The mobile phone features a number of bundled services, especially SMS (Short Message Service) is a
standardized communication service, using a communication protocol that allows you exchange short text
messages between mobile handset. The SMS service basically uses 5 protocols, and the employee is the
SMPP (Short Message Peer to Peer), the main power could easily send messages between different carriers, it
supports a greater number portability.
The "torpedo", the popular name of SMS, soon took the lead of mobile applications and was the great
propagator of data usage on mobile phones.
In Brazil, the Research “ICT households and Users 2008” of Brazil Internet Steering Committee (CGI),
found that about 56% of respondents have a mobile phone, of which 41% have Internet access. That survey
67
3. IADIS International Conference e-Democracy, Equity and Social Justice 2010
most important thing is to realize that innovation within the network will necessarily involve an intensive use
of collaborative tools, though.
3. INTERNATIONAL DIRECT DIGITAL ELECTION PROCESS
The experience was executed by the Information Society Studies Group – GESI/2009, linked to the
Universidade Federal de Santa Catarina – UFSC, and the e-Gov, Intelligence and Systems Institute – i3G,
both installed inside the city of Florianopolis – Santa Catarina – Brazil. The first ED2I was realized between
6 and 20 of November, in the year of 2009.
The tally of votes was done inside an application working on Dot Net platform, inside a server cell phone.
The experimentation had two objectives: evaluate an e-Voting method and the use of mobile devices as tools
for public decision taking; and evaluate the use of Web 2.0 environment for organization and conduction of
public discussions about these decisions.
The theme for discussion and voting was: “Is the United Nations accomplishing its mission?” To vote the
person should send a text message (SMS) with three characters for the phone number +55 48 88340682
(international) or 48 88340682 (Brazil), according to the instructions: If you want to vote YES the message
must contain the characters: 001, if the option is NOT the message must contain the characters: 002.
Any cell phone, regardless of carrier, from anywhere in the world could vote. There was no need to be a
PDA, SmartPhone or similar. Intent on making an international election, polling anywhere in the world, was
just to test the communication protocol for sending SMS through cell phones.
About security, as scientific seminar held during the votting process, using the technique of IBB (Multiple
Identical Ballot-Box) added by encrypting the votes, reaches higher security level with the existing protocols
in current electronic voting (Alefragis et all, 2004).
About the solution on sharing information inside Web 2.0 environments, about the voted theme, there was
selected the following pages: Delicious to publish links related to the experiment; iPetitions, to advice people
to the voting process; Twitter, and Blogger to the public post comments favorable or opposite to United
Nations; GMail, and Metajur Discussion List to privately post comments; Wikipedia, ScribD, and Slideshare
to publish reports or presentations resulting from the discussions about the theme; Skoob to share books
which maybe can give some historical base to the voting process, and help on argumentation about the
United Nations; Picasa, Flickr, and Panoramio to post pictures (with geographic position for the two last
pages) referred to votes assumed by the voters; You Tube to post vídeos related to the voters, assuming its
votes; Orkut, and FaceBook for the possible formation of social networks about the specified theme; and
Second Life to simulate the voting process inside virtual environments. In this paper, only the results of some
tools are going to be detailed. The tools access will be available on the references at the end of the article.
Before and during the election period, information regarding the election was released in these tools, such
as the convocatories in multiple languages, the arguments pro and con, which emphasized the theme
proposed for election as well as pictures of group meetings organizers.
Two groups were formed with the intention to raise arguments for the YES and the other for NO, and
disseminate them in the chosen Web 2.0 tools.
4. RESULTS
The cell phone used as a digital ballot box worked normally during the voting period, accumulating its basic
functions to send and receive voice calls, without any problem. The result was communicated immediately
after the final time, on 2009, November 20, at 17:00h GMT.
The result achieved was that 53.097% of the voters voted "NO" and 46.682% voted "yes". So, according
to ED2I result, the UN is not fulfilling its mission, as shown in Table 1.
69
5. IADIS International Conference e-Democracy, Equity and Social Justice 2010
transmit information. On the other hand the phone will be improved in order to identify the User and give
him/her the right to vote.
Security procedures using biometrics should and can be better explored in the User ID voting. The
biometric identification technologies are already highly sedimented varying only the applications depending
on the level of security. The challenging character would be to put this technology in a cell phone, and from
its technological attributes identifying the iris, retina, voice, fingerprint and others.
Web 2.0 was the protagonist of the disclosure of this election, using the tools of communication. They
own a good power of penetration to interact in order to convince people to participate. By themselves the
tools do not motivate people to vote, but it can be one way of motivating people to participate.
During the process, it was realized that some people did not know how to send an SMS. So, the lesson is
that when something involves technology a brief tutorial must be presented.
ACKNOWLEDGEMENT
We would like to thank i3G Institute for part of the financial support for this document and GESI/2009 by the
effort in performing the ED2I process.
REFERENCES
Alefragis, P.S. et all, 2004. An electronic voting scheme with physical multiple administrators and identical ballot boxes,
ICWI 2004: Madrid, Spain. pp. 99-106.
Bentivegna, S., 2000. Hablar de Política En La Red: Los Newgroups Políticos. Cuadernos De Información Y
Comunicación – Ciberdemocracia , Madrid, ES.
Boyd, Ovid Pacific, 2007. What Are the Future Possibilities of eDemocracy? A Discussion Paper. Springer-Verlag,
Berlin Heidelberg.
Castells, M., 2002. A sociedade em Rede. Paz e Terra, São Paulo, BR.
Davis, R., 2000. Tecnologias de la comunicación y democracia: El factor Internet. Cuadernos de Información y
Comunicación – Ciberdemocracia, Madrid, Universidad Complutense.
Friedman, T. L., 2007. O mundo é plano: um breve histórico do século XXI. Objetiva, Rio de janeiro, BR.
Garcia, T. H. B. et all, 2003. A democracia na era do governo eletrônico. In: II Simposio Internacional de Propriedade
Intelectual, Informação e Ética. In: II Simposio Internacional de Propriedade Intelectual, Informação e Ética-
Ciberética 2003, Anais do II Ciberética, 2003. v. 1. p. 1-16.
Lytras, M. D. Dimiani, E. Pablos, P. O., 2009. Web 2.0: The Bussines Modell. Springer Science+Business Media, LLC.
Mazzoleni, G., 2000. La Revolución Simbólica de Internet. Cuadernos de Información y Comunicación –
Ciberdemocracia, Madrid, Universidad Complutense.
Petrauskas, R., 2006. Los princípios y la implementación de la democracia electrónica. In: Derechos y Tecnología: Las
actividades de los poderes públicos, Thomson Civitas, Universidad de Zaragoza (Espanha), pp 85-113.
Ramos Júnior, H. S. et all, 2007. Democracia Eletrônica como um Sistema Teleológico e Emergente. In: Teoria Geral de
Sistemas: Uma abordagem multidisciplinar do conhecimento, Florianópolis: EGC, 2007. PP.36-44.
Some Web tools adresses for ED2I:
http://delicious.com/ Accessed in November, 2009
http://www.ipetitions.com/ Accessed in November, 2010
http://siweb20.blogspot.com/start Accessed in November, 2009
http://www.scribd.com/siweb20Accessed in November, 2009
http://www.slideshare.net/ Accessed in November, 2009
http://www.flickr.com/ Accessed in November, 2009
http://www.panoramio.com/ Accessed in November, 2009
http://www.youtube.com/ Accessed in November, 2009
71