Use of Wiki Systems in Archaeology: Privacy, Security and Data Protection as Key Problems

Katharina Holzinger, Andreas Holzinger, Christian Safran, Gabriele Koiner, Edgar Weippl

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Wikis are powerful, collaborative tools and can be used for educational purposes in many ways. The original idea of a Wiki is to make information accessible to all. However, it is very interesting that experiences in the use of Wikis in educational settings showed that security and data protection of wiki contents is definitely an issue. In this paper, we discuss problems and solutions on the basis of use cases from archaeological education. Interestingly, archaeologists are extremely worried about online accessible information due to the serious danger of archaeological looting. "Tomb raiders", i.e. people who excavate artefacts of cultural heritage on the basis of information stored in Geowikis, so called archaeological looters, are not aware of the value of cultural heritage, are interested only in the artefacts and destroying the cultural context, which is of enormous interest for archaeological research. Consequently, the protection of archaeological information is one of the most urgent tasks in the preservation of cultural heritage.
Originalspracheenglisch
TitelICE-B 2010 - Proceedings of the International Conference on e-Business
ErscheinungsortSetubal
Herausgeber (Verlag)SciTePress
Seiten120-123
ISBN (Print)978-989-8425-17-1
PublikationsstatusVeröffentlicht - 2010
VeranstaltungInternational Conference on E-Business: ICE-B 2010 - Athen, Griechenland
Dauer: 26 Juli 201028 Juli 2010

Konferenz

KonferenzInternational Conference on E-Business
Land/GebietGriechenland
OrtAthen
Zeitraum26/07/1028/07/10

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental

Fingerprint

Untersuchen Sie die Forschungsthemen von „Use of Wiki Systems in Archaeology: Privacy, Security and Data Protection as Key Problems“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren