TUGeoWiki, can enhance the learning process and
working in this context, the sensitive nature of
archaeological data makes privacy and security a
key issue. Authentication, authorization and auditing
processes have been shown to be necessary
inclusions in the future development of Wiki
systems in this context. In this paper, we proposed
the implementation of a dual authentication for
Wikis to protect information stored in archaeological
Wikis. Improving authentication and authorization
will enable researchers to share more information
without the fear that looters will gain unauthorized
access to data and abuse the data. Moreover,
precautions can be taken to avoid unintentional
publication of hidden data such as location
information in images. Unprotected archaeological
monuments are highly susceptible to destruction by
looters, consequently data protection in this field is
highly important.
REFERENCES
Auinger, A., Ebner, M., Nedbal, D. & Holzinger, A.
(2009) Mixing Content and Endless Collaboration –
MashUps: Towards Future Personal Learning
Environments. In: Lecture Notes in Computer Science
(LNCS 5616). Berlin, Springer, 14-23.
Bell, D. & LaPadula, L. (1976) Secure Computer System:
Unified exposition and multics interpretation.
Technical Report ESD-TR-75-306, 2997 The MITRE
Corporation, Bedford (MA).
Brodie, N. & Renfrew, C. (2005) Looting and the world's
archaeological heritage: The inadequate response.
Annual Review of Anthropology, 34, 343-361.
Connor, M. & Scott, D. D. (1998) Metal detector use in
archaeology: An introduction. Historical Archaeology,
32, 4, 76-85.
Ebner, M., Kickmeier-Rust, M. & Holzinger, A. (2008)
Utilizing Wiki-Systems in higher education classes: a
chance for universal access? Springer Universal
Access in the Information Society, 7, 4, 199-207.
Ebner, M. & Walder, U. (2007) e-Learning in Civil
Engineering - Six Years of Experience at Graz
University of Technology. In: Rebolj, D. (Ed.) 24th
W78 Conference. Maribor, Slovenia.
Ebner, M., Zechner, J. & Holzinger, A. (2006) Why is
Wikipedia so Successful? Experiences in Establishing
the Principles in Higher Education. 6th International
Conference on Knowledge Management (I-Know'06).
Graz, Austria.
Essmayr, W., Probst, S. & Weippl, E. R. (2004) Role-
based access controls: Status, dissemination, and
prospects for generic security mechanisms.
International Journal of Electronic Commerce
Research, 4, 1, 127-156.
Gorman, G. E. (2005) Is the wiki concept really so
wonderful? Online Information Review, 29, 3, 225-
226.
Holzinger, K., Safran, C., Ebner, M., Kappe, F., Koiner,
G. & Holzinger, A. (2009). Geo-Tagging in
Archaeology: Practical Experiences with the
TUGeoWiki International Congress Cultural Heritage
and New Technologies: Computers and Archaeology,
Vienna, 13.
Koiner, G., Lohner-Urban, U. & Scherrer, P. (2010) Die
Arbeiten des Grazer Teams in Tavium/Tawinija
2009,Tavium (Büyüknefes, Provinz Yozgat) und seine
Region, Bericht über die Kampagnen 2006-2009
(forthcoming). Istanbuler Mitteilungen, 60.
Meller, H. (Ed.) (2004) Der geschmiedete Himmel: die
weite Welt im Herzen Europas vor 3600 Jahren.
Begleitband zur Ausstellung: Landesmuseum für
Vorgeschichte, Halle/Saale (in German), Stuttgart,
Theiss.
Priedhorsky, R. & Terveen, L. (2008) The computational
geowiki: what, why, and how. Proceedings of the
ACM 2008 conference on Computer supported
cooperative work. San Diego, CA, USA, ACM.
Safran, C., Ebner, M., Kappe, F. & Holzinger, A. (2009a)
m-Learning in the Field: A Mobile Geospatial Wiki as
an example for Geo-Tagging in Civil Engineering
Education. In: Ebner, M. & Schiefner, M. (Eds.)
Looking Toward the Future of Technology-Enhanced
Education: Ubiquitous Learning and the Digital
Native. New York, IGI , 444-454.
Safran, C., Garcia-Barrios, V. M. & Ebner, M. (2009b)
The benefits of Geo-Tagging and microblogging in m-
Learning: a use case. Proceedings of the 13th
International MindTrek Conference: Everyday Life in
the Ubiquitous Era. Tampere, Finland, ACM.
Strobel, K. & Gerber, C. (2000) TAVIUM (Büyüknefes,
Provinz Yozgat) – Ein regionales Zentrum Anatoliens.
Bericht über den Stand der Forschungen nach den
ersten drei Kampagnen (1997-1999) (in German)
Istanbuler Mitteilungen, 50, 215-265.
Weippl, E., Ibrahim, I. K. & Winiwarter, W. (2001).
Content-based Management of Document Access
Control. 14th International Conference on
Applications of Prolog, 78-86.
Weippl, E. R. (2005) Security in E-Learning (Advances in
Information Security). New York, Springer.
USE OF WIKI SYSTEMS IN ARCHAEOLOGY - Privacy, Security and Data Protection as Key Problems
123