You are previewing Standards and Standardization.
O'Reilly logo
Standards and Standardization

Book Description

Effective communication requires a common language, a truth that applies to science and mathematics as much as it does to culture and conversation. Standards and Standardization: Concepts, Methodologies, Tools, and Applications addresses the necessity of a common system of measurement in all technical communications and endeavors, in addition to the need for common rules and guidelines for regulating such enterprises. This multivolume reference will be of practical and theoretical significance to researchers, scientists, engineers, teachers, and students in a wide array of disciplines.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Semantic Web Standards for Publishing and Integrating Open Data
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: SEMANTIC WEB STANDARDS AND OPEN DATA
      4. MAIN FOCUS: LINKED DATA
      5. SOLUTION: LINKED OPEN DATA STANDARDS AND WORKING GROUPS
      6. CONCLUSION
      7. FUTURE RESEARCH DIRECTIONS
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Common Core State Standards
      1. ABSTRACT
      2. INTRODUCTION
      3. COMMON CORE STANDARDS DEFINED
      4. HISTORY OF STANDARDS BASED REFORM AND COMMON CORE
      5. THE PROS AND CONS IN ADOPTION OF A COMMON CORE CURRICULUM
      6. THE PROMISES
      7. WHAT DOES THE FUTURE HOLD FOR THE COMMON CORE?
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. APPENDIX
    3. Chapter 3: Fundamental Aspects for E-Government
      1. ABSTRACT
      2. INTRODUCTION
      3. E-GOVERNMENT AND E-PARTICIPATION
      4. E-GOVERNMENT INITIATIVES AND IMPLEMENTATIONS
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    4. Chapter 4: Loose Integration of Local Information to Generate Collaborative Marine Science Knowledge
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE INFORMATION-KNOWLEDGE GLUE: COLLABORATIVE KNOWLEDGE ENCODING IN CONTROLLED VOCABULARIES
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Common Core Standards for Mathematical Practice and TPACK
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TPACK AND THE COMMON CORE STATE STANDARDS FOR MATHEMATICS
      5. IMPLICATIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    6. Chapter 6: On the Scientific Foundations of Enterprise Interoperability
      1. ABSTRACT
      2. INTRODUCTION
      3. FUNDAMENTALS IN SCIENCE
      4. ENTERPRISE INTEROPERABILITY SCIENCE BASE ACTION PLAN
      5. ENTERPRISE INTEROPERABILITY FUNDAMENTALS
      6. ENTERPRISE INTEROPERABILITY SCIENCE BASE ACHIEVEMENTS
      7. A GLIMPSE BEYOND ENSEMBLE: ENTERPRISE INTEROPERABILITY TOOLS
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    7. Chapter 7: Informational Text and the Common Core
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INFORMATIONAL TEXT
      5. DISCUSSION
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    8. Chapter 8: The Multidimensional Business Value of Information Systems Interoperability
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL FOUNDATIONS
      4. EMPIRICAL LITERATURE
      5. RESEARCH HYPOTHESES
      6. DATA AND METHOD
      7. RESULTS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
      11. APPENDIX
    9. Chapter 9: The Role of Security Culture
      1. ABSTRACT
      2. INTRODUCTION
      3. HUMAN RISKS
      4. THE ROLE OF CULTURE
      5. SAFETY CULTURE AND SECURITY CULTURE
      6. SECURITY CULTURE
      7. ADDRESSING THE GAPS: A CASE STUDY
      8. SOLUTIONS AND RECOMMENDATIONS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
      13. ENDNOTES
    10. Chapter 10: Consumer Privacy Enforcement in Context-Aware Web Services
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. CONSUMER PRIVACY LANGUAGE
      5. PRIVACY ENFORCEMENT MECHANISM
      6. IMPLEMENTATION
      7. USE CASE AND EVALUATION
      8. CONCLUSION
      9. REFERENCES
    11. Chapter 11: Security of ICTs Supporting Healthcare Activities
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ICT AND INFORMATION SECURITY
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  7. Section 2: Tools and Technologies
    1. Chapter 12: Teaching and Learning the Common Core State Standards in Mathematics with Web 2.0 Tools
      1. ABSTRACT
      2. ORGANIZATION BACKGROUND
      3. SETTING THE STAGE
      4. CASE DESCRIPTION
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    2. Chapter 13: Developing Secure Software Using UML Patterns
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OVERVIEW OF A SECURITY ENGINEERING PROCESS USING PATTERNS
      5. USING PROBLEM FRAMES FOR SECURITY REQUIREMENTS ENGINEERING
      6. DEVELOPMENT OF A SECURITY ARCHITECTURE
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    3. Chapter 14: Users as Prosumers of PETs
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTS ON PRIVACY AND USER-CENTERED DESIGN
      4. DEMOCRATIZING THE DESIGN OF PRIVACY ENHANCING TOOLS
      5. USING CO-CREATION FOR THE GENERATION OF PET IDEAS
      6. CONCLUSION AND FUTURE RESEARCH
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
      9. ENDNOTES
    4. Chapter 15: Disclosure and Privacy Settings on Social Networking Sites
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: SOCIAL NETWORKING SITES: FACEBOOK
      4. ONLINE DISCLOSURE
      5. ONLINE PRIVACY
      6. PRIVACY SETTINGS ON FACEBOOK
      7. GENDER, DISCLOSURE, AND PRIVACY
      8. INSTRUCTIONAL INTERVENTION FOR ENCOURAGING PRIVACY PROTECTION
      9. THE PRESENT STUDY
      10. HYPOTHESES
      11. DESIGN
      12. METHOD
      13. RESULTS
      14. DISCUSSION
      15. LIMITATIONS AND FUTURE RESEARCH
      16. REFERENCES
      17. ENDNOTE
      18. APPENDIX
    5. Chapter 16: On the Use of Formal Methods to Enforce Privacy-Aware Social Networking
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE POPORO TOOL
      5. REAL WORLD APPLICATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    6. Chapter 17: The Role of Compliance and Conformance in Software Engineering
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DESCRIBING SOFTWARE ENGINEERING ARTIFACTS
      5. THE INTERACTION BETWEEN ARTIFACTS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    7. Chapter 18: Transport Layer for Cognitive Radio Sensor Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TRANSPORT LAYER
      4. 3. TRANSPORT LAYER IN WIRELESS NETWORKS
      5. 4. TRANSPORT LAYER IN COGNITIVE RADIO SENSOR NETWORKS
      6. 5. OPEN RESEARCH ISSUES AND FUTURE DIRECTIONS
      7. 6. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    8. Chapter 19: Hybrid Modeling
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. INTEROPERABILITY AND CONCEPTUAL BACKGROUND
      4. 3. HYBRID MODELLING AS A SOLUTION FOR INTEROPERABILITY
      5. 4. THE BIVEE PROJECT AS A USE CASE SAMPLE
      6. 5. LESSONS LEARNED
      7. 6. CONCLUSION AND OUTLOOK
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    9. Chapter 20: Interoperability in Laboratory Management Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTEROPERABILITY IN LAMIS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    10. Chapter 21: A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service
      1. ABSTRACT
      2. 1. INTRODUCTION AND RELATED WORK
      3. 2. PROPOSED APPROACH
      4. 3. WORKFLOW OF THE FRAMEWORK
      5. 4. EMPIRICAL RESULT ANALYSIS
      6. 5. DISCUSSION
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
    11. Chapter 22: Software Security Engineering – Part I
      1. ABSTRACT
      2. INTRODUCTION
      3. ASPECTS OF SOFTWARE SECURITY
      4. SOFTWARE SECURITY ENGINEERING
      5. SECURITY RISK ANALYSIS
      6. THREATS MODELING
      7. CONCLUSION
      8. REFERENCES
    12. Chapter 23: Software Security Engineering – Part II
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCTION TO SECURITY POLICY
      4. ACCESS CONTROL
      5. CONSTRUCTION OF SECURE SOFTWARE
      6. SECURITY ASSESSMENT
      7. CONCLUSION
      8. REFERENCES
    13. Chapter 24: Application Security for Mobile Devices
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY OF THE MODERN MOBILE PLATFORMS: AN OVERVIEW
      4. CREDENTIAL-BASED TRUST MODELS
      5. STATIC VERIFICATION
      6. RUNTIME MONITORING
      7. EUROPEAN PROJECTS
      8. DISCUSSION
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
      13. ENDNOTES
  8. Section 3: Frameworks and Methodologies
    1. Chapter 25: Model Development and Hypotheses
      1. ABSTRACT
      2. 1 OVERVIEW AND DEVELOPMENT OF MODELS
      3. 2 CONSTRUCTS
      4. 3 CONSTRUCT LINKAGES AND HYPOTHESES
      5. 4 SUMMARY
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    2. Chapter 26: The Development of Open Government Data in Austria
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPT OF OPEN GOVERNMENT DATA
      4. COOPERATION OGD AUSTRIA
      5. OGD STANDARDS IN AUSTRIA
      6. ORGANIZATIONAL RECOMMENDATIONS
      7. THE AUSTRIAN METADATA PORTAL
      8. METADATA STANDARDS IN THE DACH REGION
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    3. Chapter 27: How to Implement Standardization Education in a Country
      1. ABSTRACT
      2. INTRODUCTION
      3. NATIONAL POLICY
      4. INVESTING IN ONGOING SUPPORT
      5. BRIDGING FIVE WORLDS: INDUSTRY, STANDARDIZATION BODIES, ACADEMIA, OTHER INSTITUTIONS FOR EDUCATION, AND GOVERNMENT
      6. OTHER EDUCATION INSTITUTIONS
      7. GOVERNMENT
      8. THE PROCESS TOWARDS MORE STANDARDIZATION EDUCATION
      9. FUTURE RESEARCH
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    4. Chapter 28: A Taxonomy of Scientific Areas Driving Assessment of Organisations Readiness
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ANALYSIS OF CURRENT ENTERPRISE INTEROPERABILITY CHALLENGES
      5. ASSESSING THE ENTERPRISE INTEROPERABILITY READINESS OF ORGANISATIONS
      6. FUTURE RESEARCH DIRECTIONS AND CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    5. Chapter 29: Agile Development of Security-Critical Enterprise System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TOWARDS AN ACCEPTABLE AGILE PROCESS FOR DEVELOPMENT OF SECURITY CRITICAL SOFTWARE
      5. CASE STUDY
      6. EVALUATION OF PROPOSED APPROACH
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    6. Chapter 30: A Conceptual Framework for Enterprise Interoperability
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH CONTEXT
      4. RELATED WORK
      5. ONTOLOGY OF ENTERPRISE INTEROPERABILITY (OoEI)
      6. MATURITY MODEL FOR ENTERPRISE INTEROPERABILITY (MMEI)
      7. INTEGRATION OF MMEI CONCEPTS INTO OoEI
      8. ILLUSTRATIVE EXAMPLE
      9. CONCLUSION
      10. REFERENCES
    7. Chapter 31: Enterprise Interoperability Science Base Structure
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINING THE STRUCTURE OF AN ENTERPRISE INTEROPERABILITY SCIENCE BASE
      5. POTENTIAL BENEFITS TO ENTERPRISE INTEROPERABILITY DOMAIN STAKEHOLDERS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    8. Chapter 32: Informational, Physical, and Psychological Privacy as Determinants of Patient Behaviour in Health Care
      1. ABSTRACT
      2. INTRODUCTION AND PROPOSED FRAMEWORK
      3. SERVICE QUALITY AND PATIENT SAFETY
      4. PRIVACY DIMENSIONS
      5. OUTCOMES OF PRIVACY PERCEPTIONS
      6. RECOMMENDATIONS AND CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    9. Chapter 33: The “Smart” Regulatory Framework
      1. ABSTRACT
      2. INTRODUCTION
      3. GOVERNMENTALITY
      4. THE CONCEPT OF REFLEXIVITY
      5. RESPONSIVE REGULATION
      6. SMART REGULATION
      7. CONCLUSION
      8. REFERENCES
      9. ENDNOTES
    10. Chapter 34: Designing Complex Agent Interaction Protocols Using Colored Petri Nets
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. OUR PREVIOUS WORK: AN OVERVIEW
      4. 3. AN APPROACH FOR AIP COMPOSITION
      5. 4. PROTOCOLS COMPOSITION OPERATORS
      6. 5. VERIFICATION OF COMPOSITE AiP CORRECTNESS
      7. 6. CASE STUDY: AN AiP BASED ARCHITECTURE FOR CLOUD SERVICES COMPOSITION
      8. 7. EVALUATION AND DISCUSSION
      9. 8. RELATED WORK
      10. 9. CONCLUSION AND FUTURE WORK
      11. REFERENCES
    11. Chapter 35: Information Security Program Effectiveness in Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. ENDNOTES
      6. APPENDIX
    12. Chapter 36: Integrated Security Process Improvement Framework for Systems and Services
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. SYSTEMS AND SERVICES SECURITY
      4. 3. THE SECURITY ASSESSMENT AND IMPROVEMENT PROCESS
      5. 4. PROPOSED FRAMEWORK FOR SECURITY ASSESSMENT AND IMPROVEMENT
      6. 5. PRELIMINARY RESULTS
      7. 6. CONCLUSION
      8. REFERENCES
    13. Chapter 37: A Security Risk Management Metric for Cloud Computing Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. INFORMATION SECURITY RISKS MANAGEMENT
      4. 3. CLOUD COMPUTING ENVIRONMENT
      5. 4. QUANTIFYING SECURITY THREATS FOR CLOUD COMPUTING SYSTEM
      6. 5. SUPPORTING A CLOUD COMPUTING BUSINESS MODEL
      7. 6. VULNERABILITIES IN CLOUD COMPUTING
      8. 7. CONCLUSION
      9. REFERENCES
    14. Chapter 38: A Framework for Measuring the Deployment of Internet Protocols
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODS
      5. FRAMEWORK FOR MEASURING PROTOCOL DEPLOYMENT
      6. APPLICATION OF THE FRAMEWORK TO THE FINNISH MOBILE MARKET
      7. DISCUSSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ENDNOTES
      11. APPENDIX
    15. Chapter 39: Management of Technical Security Measures
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL FOUNDATIONS
      4. RESEARCH MODEL AND HYPOTHESES
      5. RESEARCH METHODOLOGY
      6. RESULTS
      7. LIMITATIONS AND FUTURE RESEARCH
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    16. Chapter 40: A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. ACKNOWLEDGMENT
      4. REFERENCES
      5. ENDNOTE
    17. Chapter 41: A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RUNNING EXAMPLE
      4. 3. METHOD
      5. 4. IMPLEMENTATION
      6. 5. EVALUATION/DISCUSSION
      7. 6. RELATED WORK
      8. 7. CONCLUSION AND FUTURE WORK
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. ENDNOTES
    18. Chapter 42: An Extension of Business Process Model and Notation for Security Risk Management
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY RISK-AWARE BPMN
      5. DISCUSSION
      6. ACKNOWLEDGMENT
      7. REFERENCES
      8. ENDNOTES
  9. Section 4: Cases and Applications
    1. Chapter 43: Exploring the Factors Influencing the Adoption of Open Government Data by Private Organisations
      1. ABSTRACT
      2. INTRODUCTION
      3. FRAMEWORK FOR INVESTIGATING OPEN GOVERNMANT DATA USE
      4. CASE STUDY APPROACH
      5. RESEARCH FINDINGS: FACTORS FOR THE USE OF OPEN GOVERNMENT DATA
      6. RECOMMENDATIONS
      7. CONCLUSION
      8. REFERENCES
    2. Chapter 44: Providing Information from Brazilian Politicians Using Linked Data
      1. ABSTRACT
      2. INTRODUCTION
      3. OPEN GOVERNMENT DATA
      4. LINKED DATA
      5. BRAZILIAN POLITICIANS DATA SET
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. ENDNOTES
    3. Chapter 45: Seizing Opportunities for the Support of Innovation through Committee Standards and Standardization
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THEORETICAL OVERVIEW
      4. 3. RESEARCH DESIGN, DATA COLLECTION AND ANALYSIS
      5. 4. PROCESS MODEL
      6. 5. OPPORTUNITIES FOR THE SUPPORT OF INNOVATION THROUGH STANDARDS AND STANDARDIZATION
      7. 6. DISCUSSION
      8. 7. CONCLUSION AND DIRECTIONS FOR FUTURE RESEARCH
      9. ACKNOWLEDGMENT
      10. REFERENCES
    4. Chapter 46: Profiles and Motivations of Standardization Players
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. METHODOLOGY
      4. 3. RESULTS OF THE ANALYSIS
      5. 4. PROFILES AND CLASSIFICATION
      6. 5. FINAL REMARKS
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. APPENDIX
    5. Chapter 47: Adoption of ISO 27001 in Cyprus Enterprises
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF ISO 27001
      4. SURVEY DESIGN LOGISTICS
      5. SURVEY FINDINGS ANALYSIS
      6. ASSESSMENT OF ISO 27001 IN CYPRUS
      7. RECOMMENDATIONS FOR ISO 27001 ADOPTION IN CYPRUS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY WORDS AND DEFINITIONS
    6. Chapter 48: Understanding the Information Security Landscape in South Africa
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. INFORMATION SECURITY: A LITERATURE REVIEW
      4. 3. CONCEPTUAL FRAMEWORK
      5. 4. E-GOVERNMENT AND INFORMATION SECURITY IN SOUTH AFRICA
      6. 5. INFORMATION SECURITY IMPLEMENTATION HURDLES
      7. 6. DISCUSSION
      8. 7. CONCLUSION
      9. REFERENCES
    7. Chapter 49: Publishing Statistical Data following the Linked Open Data Principles
      1. ABSTRACT
      2. ORGANIZATION BACKGROUND
      3. INTRODUCTION
      4. BACKGROUND
      5. PROMOTION OF RAW STATISTICS TO THE LINKED OPEN DATA INITIATIVE
      6. CASE STUDY: THE WEB INDEX PROJECT
      7. RESULTS AND EXAMPLES
      8. CONCLUSION AND FUTURE WORK
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. ENDNOTES
    8. Chapter 50: Prior Negative Experience, Online Privacy Concerns and Intent to Disclose Personal Information in Chinese Social Media
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL FRAMEWORK
      4. METHOD
      5. RESULTS
      6. DISCUSSION AND IMPLICATIONS
      7. LIMITATIONS AND FUTURE RESEARCH
      8. REFERENCES
      9. APPENDIX
    9. Chapter 51: Students' Experiences Composing and Decomposing Two-Dimensional Shapes in First and Second Grade Mathematics Classrooms
      1. ABSTRACT
      2. OVERVIEW
      3. THEORETICAL FRAMEWORK
      4. METHOD
      5. FINDINGS
      6. DISCUSSION
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    10. Chapter 52: Insights from U.S. Experience to Guide International Reliance on Standardization
      1. ABSTRACT
      2. INTRODUCTION
      3. LIFE CYCLE ANALYSIS FOR ENVIRONMENTAL STANDARDS
      4. CHARACTERISTICS OF STANDARDS
      5. REGULATION OF ENVIRONMENTAL STANDARDIZATION
      6. CONCLUSION
      7. REFERENCES
    11. Chapter 53: Framework Design and Case Study for Privacy-Preserving Medical Data Publishing
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RELATED WORKS
      4. 3. FRAMEWORK FOR PRIVACY PRESERVING HEALTH CARE DATA SHARING
      5. 4. CASE STUDY FOR CHINESE EMR PUBLISHING
      6. 5. EXPERIMENTAL EVALUATION
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
  10. Section 5: Issues and Challenges
    1. Chapter 54: Is Open Data Enough?
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND MOTIVATIONS
      4. RESEARCH METHOD
      5. THEORETICAL FRAMEWORK AND INTERPRETATIVE MODEL
      6. OPEN GOVERNMENT IN THE UNITED KINGDOM
      7. OPEN GOVERNMENT IN FRANCE
      8. DISCUSSION
      9. CONCLUSION AND FUTURE RESEARCH
      10. ACKNOWLEDGEMENT
      11. REFERENCES
    2. Chapter 55: Government Spending Transparency on the Internet
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. GOVERNMENT SPENDING TRANSPARENCY VIA OD MECHANISMS: SCOPE AND BEST PRACTICES
      4. 3. THE GREEK DIAVGEIA PROGRAM
      5. 4. BOTTOM-UP INITIATIVES IN GREECE FOR OPEN PUBLIC SPENDING DATA
      6. 5. AN ASSESSMENT OF DIAVGEIA: PROS AND CONS
      7. 6. AN ASSESSMENT OF THE BOTTOM-UP OD INITIATIVES REVIEWED: PROS AND CONS
      8. 7. CONCLUDING REMARKS
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. ENDNOTES
    3. Chapter 56: A Multi-Tiered Perspective on Healthcare Interoperability
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CASE STUDY
      5. DISCUSSION
      6. ACKNOWLEDGMENT
      7. REFERENCES
    4. Chapter 57: Trapped in My Mobility
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: PRIVACY BY DESIGN
      4. MOBILE ECOSYSTEMS AND USERS’ AUTONOMY OF CHOICE
      5. THE HOME MODE FOR MOBILE PRIVACY: PRINCIPLES AND PROBLEMS
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    5. Chapter 58: Information Security and Information Assurance
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. INFORMATION SECURITY
      4. 3. INFORMATION ASSURANCE
      5. 4. INFORMATION SECURITY VS. INFORMATION ASSURANCE: THE DISCUSSION
      6. 5. THE ADAPTED DEFINITIONS OF INFORMATION SECURITY AND INFORMATION ASSURANCE
      7. 6. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    6. Chapter 59: Infusing Innovation in the Policy Analysis and Evaluation Phases of the Policy Cycle
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. OVERVIEW OF THE PROPOSED APPROACH
      4. 3. A THEORETICAL FRAMEWORK FOR INCLUSIVE POLICY ANALYSIS
      5. 4. TECHNICAL APPROACH
      6. 5. USE CASE SCENARIOS
      7. 6. ANTICIPATED BENEFITS AND ADDED VALUE
      8. 7. CONCLUSION AND NEXT STEPS
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. ENDNOTES
    7. Chapter 60: Analyzing Human Factors for an Effective Information Security Management System
      1. ABSTRACT
      2. INTRODUCTION
      3. HUMAN FACTORS FOR INFORMATION SECURITY
      4. RESEARCH METHODOLOGY
      5. SWOT
      6. STUDY ON SECURITY INCIDENTS
      7. STUDY INCIDENTS
      8. DISCUSSION
      9. OVERALL OBSERVATION
      10. THREATS TO STUDY VALIDITY
      11. CONCLUSION
      12. REFERENCES
    8. Chapter 61: Security of Safety Important I&C Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STATE-OF-ART DOCUMENTS IN THE AREA OF CYBER SECURITY
      5. SAFETY AND SECURITY CONCEPTS FOR I&C SYSTEMS
      6. ASSESSMENT OF I&C SYSTEMS CYBER SECURITY
      7. ASSURANCE OF CYBER SECURITY FOR SAFETY IMPORTANT I&C SYSTEMS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    9. Chapter 62: Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. RESEARCH METHODOLOGY
      5. RESULTS AND DISCUSSION
      6. CONCLUSION AND FUTURE WORK
      7. REFERENCES
    10. Chapter 63: Privacy Concerns and Networks of Communication among Classmates
      1. ABSTRACT
      2. 1. INTRODUCTION: COMMUNICATIONS AND NETWORKS
      3. 2. THE RELATIONAL NATURE OF PRIVACY
      4. 3. SURVEYING COMMUNICATION NETWORKS AND PRIVACY ATTITUDES OF HIGH SCHOOL STUDENTS
      5. 4. CODES OF BEHAVIOR AND MORAL JUDGMENT ABOUT INFRINGEMENTS ON THE INTERNET
      6. 5. COLLECTION AND ANALYSIS OF NETWORK DATA ON PRIVACY ATTITUDES
      7. 6. CONCLUSION: PRIVACY PERCEPTION AND SOCIETAL AWARENESS
      8. REFERENCES
      9. ENDNOTES
    11. Chapter 64: Investigating Privacy Perception and Behavior on Weibo
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THEORETICAL DEVELOPMENT AND HYPOTHESES
      4. 3. METHODOLOGY
      5. 4. RESULTS
      6. 5. DISCUSSION
      7. 6. THEORETICAL AND PRACTICAL IMPLICATIONS
      8. REFERENCES
      9. APPENDIX: MEASUREMENT ITEMS AND DESCRIPTIVE STATISTICS
    12. Chapter 65: Security and Privacy Issues in Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. ARCHITECTURE OF CLOUD COMPUTING
      4. CLOUD COMPUTING SECURITY AND PRIVACY ISSUES
      5. SOME PROPOSITIONS FOR SECURITY IN CLOUD COMPUTING
      6. STANDARDIZATION ACTIVITIES IN CLOUD COMPUTING
      7. EMERGING TRENDS IN SECURITY AND PRIVACY IN CLOUD COMPUTING
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    13. Chapter 66: Privacy Preserving Text Analytics
      1. ABSTRACT
      2. INTRODUCTION
      3. A SURVEY OF TEXT MINING TECHNIQUES
      4. A SURVEY OF PRIVACY PRESERVING DATA MINING
      5. RESEARCH CHALLENGES AND STRATEGIES IN NAME ANALYSIS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. APPENDIX
    14. Chapter 67: Composition of the Top Management Team and Information Security Breaches
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW AND STATEMENT OF HYPOTHESES
      4. DATA COLLECTION AND EMPIRICAL MODELS
      5. EMPIRICAL RESULTS
      6. IMPLICATIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
  11. Section 6: Emerging Trends
    1. Chapter 68: Cyber Security
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. CYBER SECURITY: FUTURE IT-SECURITY CHALLENGES FOR TOMORROW’S LEADERS AND BUSINESSES
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 69: Understanding Children's Private Speech and Self-Regulation Learning in Web 2.0
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVATE SPEECH (PS)
      4. CURRENT DEFINITIONS AND MODELS
      5. SELF-REGULATION LEARNING (SRL)
      6. AGINIAN’S STUDIES: AN OVERVIEW
      7. CRITIQUES ON CHILDREN’S SPEECH AND SELF-REGULATION
      8. CONCLUSION AND REFLECTION
      9. REFERENCES
    3. Chapter 70: Privacy in Participatory Sensing Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PARTICIPATORY SENSING SYSTEMS
      5. RESEARCH CHALLENGES
      6. TAXONOMY OF PRIVACY
      7. PRIVACY ATTACKS AND ADVERSARY MODELLING
      8. PRESERVING DATA PRIVACY
      9. PRESERVING LOCATION PRIVACY
      10. LOCATION PRIVACY AND DATA INTEGRITY TRADE-OFF
      11. FUTURE RESEARCH DIRECTIONS
      12. DISCUSSION
      13. CONCLUSION
      14. REFERENCES
      15. ADDITIONAL READING
      16. KEY TERMS AND DEFINITIONS
    4. Chapter 71: Underpinning EISB with Enterprise Interoperability Neighboring Scientific Domains
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LITERATURE REVIEW ON NEIGHBORING DOMAINS
      5. EISB FLUID KNOWLEDGE
      6. FUTURE RESEARCH DIRECTIONS AND CONSIDERATIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    5. Chapter 72: Trends in Information Security
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INFORMATION SECURITY AND COLLABORATION ACROSS BOUNDARIES
      5. INFORMATION SECURITY: BUSINESS ORIENTATION
      6. INFORMATION SECURITY AND CLOUD COMPUTING
      7. INFORMATION SECURITY: STANDARDS AND REGULATIONS LANDSCAPE
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    6. Chapter 73: Towards an Enhanced Interoperability Service Utility
      1. ABSTRACT
      2. CONTEXT, SCOPE AND OBJECTIVES OF THE CHAPTER
      3. CURRENT BUSINESS ENVIRONMENT
      4. THE ISU CONCEPT
      5. AN ONTOLOGY-BASED ISU
      6. THE PROPOSED ISU PLATFORM
      7. CONCLUSION, REUSABLE COMPONENTS, AND FUTURE CHALLENGES
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    7. Chapter 74: News Trends Processing Using Open Linked Data
      1. ABSTRACT
      2. ORGANIZATION BACKGROUND
      3. CASE DESCRIPTION
      4. CURRENT CHALLENGES FACING THE ORGANIZATION
      5. SOLUTIONS AND RECOMMENDATIONS
      6. REFERENCES
    8. Chapter 75: Privacy in the 21st Century
      1. ABSTRACT
      2. INTRODUCTION
      3. PRIVACY
      4. LIVING IN SURVEILLANCE SOCIETIES
      5. THE OPEN DATA ERA
      6. PRIVACY IN THE OPEN ERA
      7. CONCLUSION
      8. REFERENCES
    9. Chapter 76: Privacy-Aware Web Service Composition and Ranking
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. MODELING SERVICE COMPOSITION
      5. MODELING PRIVACY
      6. PRIVACY AWARE SERVICE SELECTION
      7. SYSTEM ARCHITECTURE
      8. CONCLUSION
      9. REFERENCES