ebook img

e-Citizens: Toward a New Model of (Inter)active Citizenry PDF

207 Pages·2019·6.304 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview e-Citizens: Toward a New Model of (Inter)active Citizenry

Alfredo M. Ronchi e-Citizens Toward a New Model of (Inter)active Citizenry e-Citizens Alfredo M. Ronchi e-Citizens Toward a New Model of (Inter)active Citizenry AlfredoM.Ronchi PolitecnicodiMilano Milano,Italy ISBN978-3-030-00745-4 ISBN978-3-030-00746-1 (eBook) https://doi.org/10.1007/978-3-030-00746-1 LibraryofCongressControlNumber:2018961012 ©SpringerNatureSwitzerlandAG2019 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this bookarebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. CoverPhotograph:PëtrIl’ičČajkovskijStatueinMoscow/PantheonDomeRome,©2018TheAuthor ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Starting from the first decade of the twenty-first century, a relevant number of governmental agencies, institutions and private enterprises spread all over the world in both industrialised and developing countries invested time and resources on e-Services. We are now in a position to draw some conclusions about this preliminary phase. Are such investments effectively useful and appreciated by citizens? Apart from technology what are the most relevant factors influencing their success or failure? Governments, institutions and citizens are ready and willing e-Services? Are e-Services a real tsunami for governmental institutions andagencies?Arecitizensconcernedaboutprivacyissuesand“cyber”security? ICTisstimulatingchangesinthewaymostpeopleearntheirincomes,varyingthe balance between our roles as consumers and producers, changing the way we educate succeeding generations and train ourselves, changing the fruition of the world’s cultural heritage,transforming the delivery of health care, altering the way wegovernourselves,changingthewayweformcommunities,varyingthewaywe obtainandcommunicateinformation,contributingtobridgesomeculturalorphys- icalgaps,modifyingpatternsofactivityamongtheelderlyandperhapscontributing toagreenerworld. Thisisnotacompletelistofchangesbuthighlightssomeofthemostprominent andimportanteffectsofICTonoursociety. Thisbookpresentsaviewofasocietychangingundertheinfluenceofadvanced informationtechnology.Computershavebeenaroundforabouthalfacentury,and theirsocialeffectshavebeendescribedundermanyheadings.Thisvolumeprovides aninsightaboutthemaintechnologicalandhumanissuesandaholisticapproachto inclusion, security, safety and, last but more important, privacy and freedom of expression. Everyone experienced in “ICT-based innovation” knows that “It is not only a matter of technology”. The main aim of this work is to bridge the gap between technologicalsolutionsandsuccessfulimplementationandfruitfulutilisationofthe mainsetofe-Servicestotallyorpartiallycareofgovernments. v vi Preface Differentparametersareactivelyinfluencingthesuccessorfailureofe-Services: culturalaspects,organisationalissues,bureaucracyandworkflow,infrastructureand technologyingeneral,users’habits,literacy,capacityormerelyinteractiondesign. Thisincludeshavingasignificantpopulationofcitizenswillingandabletoadopt and use online services and developing the managerial and technical capability to implementapplicationstomeettheneedsofcitizens.Aselectionofsuccessstories and failures, duly commented on, will help the reader in identifying the right approachtoinnovationingovernmentale-Services. The title e-Citizens chosen for this volume is intended to call attention to the fundamental transformations in social organisation and structure. This is part of a collection of books “e-Citizens: Being Human in the Digital Age”; the first three volumesare e-Citizens: Toward a New Model of (Inter)active Citizenry; e-Democ- racy:TowardaNewModelof(Inter)activeSociety;ande-Services:TowardaNew Model of (Inter)active Community, all of them published by Springer International2019. TargetAudience Public authorities, decision-makers, stakeholders, solution developers, university students. PrerequisiteKnowledgeofAudience Informedone-Contentande-Services,basicsontechnologyside. Milano,Italy AlfredoM.Ronchi Contents 1 BeingHumanintheDigitalAge. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 ... 1984Won’tBeLike“1984”?. . . . . . . . . . . . . . . . . . . . . . . . 3 2 Netizens,Communities,e-CitizensBeingHumanintheDigitalAge. . . 5 2.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 ICTasaDriverofChange. . . . .. . . .. . . . .. . . . .. . . .. . . . .. 6 2.3 FromPunchedCardstoPads. . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 From“Vision”toReality. . . .. . . . . .. . . . . .. . . . . . .. . . . . .. 9 2.5 EvolutionofCommunicationinPills. . . . . . . . . . . . . . . . . . . . . 13 2.6 e-Citizens:The“Mobile”Generation. . . . . . . . . . . . . . . . . . . . . 14 2.7 Re-shapingtheMarket:ThePowerofPlatforms. . . . . . . . . . . . . 15 2.8 SocialMedia:OpportunitiesandThreats. . . . . . . . . . . . . . . . . . 17 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3 Well-BeingintheDigitalAge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 3.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 3.2 Well-Being:DefinitionsandIndicators. . . . . . . . . . . . . . . . . . . . 24 3.3 e-Government:TheCitizenasaUser. . . . . . . . . . . . . . . . . . . . . 27 3.4 OpenGovernment:TheSearchforthe“HappyCitizen”. . . . . . . 28 3.5 FromDigitalCitiestoSmartCities. . . . . . . . . . . . . . . . . . . . . . 30 3.6 IssyLesMoulineaux:ASmartCity. . . . . . . . . . . . . . . . . . . . . . 36 3.7 TheEvolutionofSmartCities. . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.8 Identity,Multiculturalism,andWellbeing. . . . . . . . . . . . . . . . . . 39 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 4 SafetyandSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 4.2 CyberandSafety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 4.2.1 HumanFactors:FeelingSafe. . . . . . . . . . . . . . . . . . . . 46 4.3 SomeExamplesofAPPsandAffordableDevices. . . . . . . . . . . . 47 4.4 SlowOnsetDisasters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 vii viii Contents 4.5 InternetofThings,CCTV,Drones. . . . . . . . . . . . . . . . . . . . . . . 51 4.5.1 EthicalandMoralAspectsinUAVandArtificial Intelligence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.6 ACultureofSafetyandSecurity. . . . . . . . . . . . . . . . . . . . . . . . 55 4.7 Cyber-Security,“Mother”ofICTs&Security. . . . . . . . . . . . . . . 55 4.7.1 HackersandCybercriminals. . . . . . . . . . . . . . . . . . . . . 56 4.7.2 CyberWarriors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 4.7.3 CyberLawsandRegulations. .. . . . .. . . .. . . .. . . . .. 60 4.7.4 MostCommonAttacks. . . . . . . . . . . . . . . . . . . . . . . . . 66 4.7.5 ToolsandProcedures. . . . . . . . . . . . . . . . . . . . . . . . . . 75 4.8 DataProtection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 4.8.1 Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 4.8.2 Cryptography.. . . . . . . . . .. . . . . . . . .. . . . . . . . . .. . 76 4.8.3 MoreAboutCryptography. . . . . . . . . . . . . . . . . . . . . . 76 4.8.4 EncryptionintheInternetEra. . . . . . . . . . . . . . . . . . . . 87 4.8.5 SecureSocketLayer(SSL). . . . . . . . . . . . . . . . . . . . . . 92 4.8.6 Symmetricvs.AsymmetricEncryption. . . . . . . . . . . . . 92 4.8.7 FutureofEncryption. . . . . . . . . . . . . . . . . . . . . . . . . . 93 4.9 UserIdentity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 4.9.1 Credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 4.9.2 OneTimePassword. . . . . . . . . . . . . . . . . . . . . . . . . . . 95 4.9.3 DynamicPasswords. . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.9.4 Biometrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 4.10 Twenty-FirstCenturyCyberWarfare. . . . . . . . . . . . . . . . . . . . . 100 4.10.1 WhatDoWeTerm“War”?. . . . . . . . . . . . . . . . . . . . . . 101 4.11 CyberRange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.12 InformationandDataStreamManagement. . . . . . . . . . . . . . . . . 103 4.13 RiskAssessmentApproach. . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 4.14 FinalRemarks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 5 TechnologiesandPrivacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 5.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 5.2 Ownership,Use,AbuseandMisuse. . . . . . . . . . . . . . . . . . . . . . 110 5.3 OwningInformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 5.4 DataandOwnership. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 5.5 CyberspaceisreallyaBlackHole?. . . . . . . . . . . . . . . . . . . . . . 112 5.6 Internet“Prosumers”Initiative:MyDataBelongstoMe. . . . . . . 113 5.7 LawsandRegulations. . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . 114 5.8 EUDataProtectionDirectiveandPersonalDataRe-use. . . . . . . 115 5.9 ResponsibilitiesinDataRe-use. . . . . . . . . . . . . . . . . . . . . . . . . 116 5.10 TheRoleofPrivacyandRiskRelatedtoBreaches. . . . . . . . . . . 117 5.11 RiskAssessment:Mapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Contents ix 5.12 AspectsConnectedtoSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . 122 5.13 OpenSourceIntelligence(OSINT). . . . . . . . . . . . . . . . . . .. . . . 122 5.14 Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 6 InteractionDesignEssentials. . . . . . . . .. . . . . . . . . .. . . . . . . . . . .. 125 6.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 6.2 Man-ComputerInteraction. . . . . . . . . . .. . . . . . . . . . . . . . . .. . 126 6.3 InteractionDesignEssentials. . . . . . . . . . . . . . . . . . . . . . . . . . . 129 6.4 TheAimofInteractionDesign. .. . . . . . . .. . . . . . .. . . . . . . .. 130 6.5 InformationTransmission. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 6.6 Accessibility. . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . .. . 134 6.7 Usability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 6.8 SoftwareGuidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 6.8.1 IconicDesign. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 6.8.2 ErrorHandlingPractice. . . . . . . . . . . . . . . . . . . . . . . . 136 6.8.3 ErrorMessageDesignPractices. . . . . . . . . . . . . . . . . . 137 6.8.4 ColourDesignGuidelines. . . . . . . . . . . . . . . . . . . . . . . 138 6.8.5 WesternColourConventions. . . . . . . . . . . . . . . . . . . . 138 6.8.6 RespondingTable. . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 6.8.7 IconCheckList. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 6.9 ThirteenPrinciplesofDisplayDesign. . . . . . . . . . . . . . . . . . . . 141 6.9.1 PerceptualPrinciples. . . . . . . . . . . . . . . . . . . . . . . . . . 141 6.9.2 MentalModelPrinciples. . . . . . . . . . . . . . . . . . . . . . . . 142 6.9.3 PrinciplesBasedonAttention. . . . . . . . . . . . . . . . . . . . 143 6.9.4 MemoryPrinciples. . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 6.9.5 UserInterfaceDesignPrinciples . . . . .. . . . . .. . . . . .. 144 6.10 Designingfor“Seniors”. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 6.10.1 SoftwareInteractionDesignforSeniors. . . . . . . . . . . . . 146 6.10.2 HardwareInterface:Devices. . . . . . . . . . . . . . . . . . . . . 148 6.10.3 SmartPhones,Tabletsand“Seniors”. . . . . . . . . . . . . . . 148 6.10.4 ATypicalApproachforSeniors. . . . . . . . . . . . . . . . . . 149 6.11 Let’sRecapUsersRequirements. . . . . . . . . . . . . . . . . . . . . . . . 151 6.12 That’sLifeDearProduct!. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 7 InternetGovernance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 7.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 7.2 Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 7.3 The“Power”oftheInternet. . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 7.4 WhoisrulingtheInternet?. . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 7.5 InternetCorporationforAssignedNamesandNumbers. . . . . . . . 166 7.5.1 ICANN:MainPrinciples. . . . . . . . . . . . . . . . . . . . . . . 166 x Contents 7.6 WhatistheInternetGovernanceForum(IGF)?. . . . . . . . . . . . . . 174 7.6.1 IGFMandate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 7.6.2 TheMulti-stakeholderAdvisoryGroup(MAG). . . . . . . 175 7.7 InternetGovernance:EuropeanCommissionInitiative. . . . . . . . . 181 7.8 GlobalizationoftheInternetGovernance. . . . . . . . . . . . . . . . . . 182 7.9 TheRoleofPublicGovernanceAuthorities. . . . . . . . . . . . . . . . 182 7.9.1 Vision. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 7.10 SideEffectsDuetoDigitalEconomy. . . . . . . . . . . . . . . . . . . . . 184 7.10.1 InternetTax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 7.11 InternetGovernanceinRussia. . . . . . . . . . . . . . . . . . . . . . . . . . 186 7.12 InternetGovernanceinChina:CyberSovereignty. . . . . . . . . . . . 187 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.