List of Contributors.
Table of Contents.
1: Fundamental Concepts and Theories.
2: Introduction to Continuous Authentication.
3: Password Sharing and how to Reduce it.
4: Convergence of Fixed and Mobile Networks.
5: Trust Management and User’s Trust Perception in e-Business.
6: Study and Non-Study Related Technologies Use of Flemish Students in Higher Education.
7: Stepwise E-Participation: Good Practice from the Regional Level in Europe.
8: Public Key Infrastructure.
9: Access Control in Federated Clouds: The Cloudgrid Case Study.
10: Learning, Unlearning, and Relearning: Using Web 2.0 Technologies to Support the Development of Lifelong Learning Skills.
11: The Evolution of KM Practices: The Case of the Renault-Nissan International Strategic Alliance.
12: Semantic Policies for Modeling Regulatory Process Compliance.
13: Near Field Authentication.
14: Continuous Authentication in Computers.
15: Grid Data Handling.
16: Mass Media Strategies: Hybrid Approach Using a Bioinspired Algorithm and Social Data Mining.
17: Tools and Technologies.
18: Reversible Information Hiding and Its Application to Image Authentication.
19: Applied Cryptography in Electronic Commerce.
20: Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication.
21: Continuous User Authentication Based on Keystroke Dynamics through Neural Network Committee Machines.
22: Identity-Based Cryptography: Applications, Vulnerabilities, and Future Directions.
23: Denial of Service Resilience of Authentication Systems.
24: Applied Cryptography in Wireless Sensor Networks.
25: A Hybrid Port-Knocking Technique for Host Authentication.
26: mVITAL: A Standards Compliant Vital Sign Monitor.
27: IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA.
28: Elliptic Curve Cryptography on WISPs.
29: Point-of-Sale Technologies at Retail Stores: What Will the Future be Like?.
30: A Keystroke Biometric System for Long-Text Input.
1: Tools and Technologies.
2: An Electronic Contract Signing Protocol Using Fingerprint Biometrics.
3: Brain-Like System for Audiovisual Person Authentication Based on Time-to-First Spike Coding.
4: Frameworks and Methodologies.
5: Using a Social Learning Community to Actively Engage Students’ Participation in a Virtual Classroom.
6: MAC and PHY-Layer Network Coding for Applications in Wireless Communications Networks.
7: Key Management.
8: Creating Ongoing Online Support Communities through Social Networks to Promote Professional Learning.
9: Security Management in Heterogeneous Distributed Sensor Networks.
10: A Method of Analysing the Use of Social Networking Sites in Business.
11: Policy Management in Cloud: Challenges and Approaches.
12: Modeling Access Control in Healthcare Organizations.
13: An Access Control Model for Dynamic VR Applications.
14: Building a Cloud-Based Mobile Application Testbed.
15: Developing Proactive Security Dimensions for SOA.
16: National Interoperability Frameworks: The Way Forward.
17: Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions.
18: Cases and Applications.
19: The Integration of Social Networking in Creating Collaborative Partnerships in Education.
20: Audio Visual System for Large Scale People Authentication and Recognition over Internet Protocol (IP).
21: Music is the Key: Using our Enduring Memory for Songs to Help Users Log On.
22: Investigating the Performance of the TSS Scheme in Noisy MANETs.
23: Secure Exchange of Electronic Health Records.
24: RBAC with Generic Rights, Delegation, Revocation, and Constraints.
25: E-Simulations for Educating the Professions in Blended Learning Environments.
26: Crowdfunding to Improve Environmental Projects’ Logistics.
27: Youth and Online Social Networking: From Local Experiences to Public Discourses.
28: Online Political Participation in the 2008 U.S. Presidential Election: Examining the Democratic Divide.
29: The Role of Social Networking in Civilizational Development: Towards Better Communication and Reasoning in the Global Virtual Nation and Virtual Nation.
30: Technological Approaches to Maintaining Academic Integrity in Management Education.
31: Improving the Effectiveness of Advertising in Internet Social Networking.
1: Issues and Challenges.
2: Security Policy Issues in Internet Banking in Malaysia.
3: Caught in the Web: The Internet and the Demise of Medical Privacy.
4: Gender Differences in Social Networking Presence Effects on Web-Based Impression Formation.
5: Sociocognitive Inquiry.
6: End-Users’ Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture: Applying the UTAUT Model.
7: Certification and Security Issues in Biomedical Grid Portals: The GRISSOM Case Study.
8: Web Services Composition Problem: Model and Complexity.
9: Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities: A Case Study of VeriGuide.
10: The Paradox of the Interactive Web in the U.S. Public Sector.
11: A Game Theoretical Approach to Design: A MAC Protocol for Wireless Sensor Networks.
12: Cognitive Cooperation in Wireless Networks.
13: Security and Trust in a Global Research Infrastructure.
14: Social Networking and Identity.
15: Digital Convergence and Horizontal Integration Strategies.
16: Emerging Trends.
17: Stepping Over the Edge: The Implications of New Technologies for Education.
18: Web 2.0 for eParticipation: Transformational Tweeting or Devaluation of Democracy?.
19: Privacy–Aware Organisation–Based Access Control Model (PrivOrBAC).
20: Internet Security Using Biometrics.
21: A Social Relational Network–Based Architecture for Maintaining the Media Integrity and Optimizing the Quality of Experience: A Technical and Business Perspective.
22: Towards Continuous Authentication Based on Gait Using Wearable Motion Recording Sensors.
23: Using a Design Research Approach to Investigate the Knowledge–Building Implications of Online Social Networking and Other Web 2.0 Technologies in Higher Education Contexts.
24: Energy–Efficient MAC Protocols in Distributed Sensor Networks.
25: RSU Deployment for Content Dissemination and Downloading in Intelligent Transportation Systems.
26: Cloud Environment Controls Assessment Framework.
27: Applying Continuous Authentication to Protect Electronic Transactions.
28: Securing the External Interfaces of a Federated Infrastructure Cloud.