Use of Wiki Systems in Archaeology: Privacy, Security and Data Protection as Key Problems

Katharina Holzinger, Andreas Holzinger, Christian Safran, Gabriele Koiner, Edgar Weippl

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Wikis are powerful, collaborative tools and can be used for educational purposes in many ways. The original idea of a Wiki is to make information accessible to all. However, it is very interesting that experiences in the use of Wikis in educational settings showed that security and data protection of wiki contents is definitely an issue. In this paper, we discuss problems and solutions on the basis of use cases from archaeological education. Interestingly, archaeologists are extremely worried about online accessible information due to the serious danger of archaeological looting. "Tomb raiders", i.e. people who excavate artefacts of cultural heritage on the basis of information stored in Geowikis, so called archaeological looters, are not aware of the value of cultural heritage, are interested only in the artefacts and destroying the cultural context, which is of enormous interest for archaeological research. Consequently, the protection of archaeological information is one of the most urgent tasks in the preservation of cultural heritage.
Original languageEnglish
Title of host publicationICE-B 2010 - Proceedings of the International Conference on e-Business
Place of PublicationSetubal
PublisherSciTePress
Pages120-123
ISBN (Print)978-989-8425-17-1
Publication statusPublished - 2010
EventInternational Conference on E-Business: ICE-B 2010 - Athen, Greece
Duration: 26 Jul 201028 Jul 2010

Conference

ConferenceInternational Conference on E-Business
Country/TerritoryGreece
CityAthen
Period26/07/1028/07/10

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental

Fingerprint

Dive into the research topics of 'Use of Wiki Systems in Archaeology: Privacy, Security and Data Protection as Key Problems'. Together they form a unique fingerprint.

Cite this