41 research outputs found

    Disaggregating the Policing Function

    Get PDF

    A Consolidated View of Context for Intelligent Systems

    Get PDF
    This paper's main objective is to consolidate the knowledge on context in the realm of intelligent systems, systems that are aware of their context and can adapt their behavior accordingly. We provide an overview and analysis of 36 context models that are heterogeneous and scattered throughout multiple fields of research. In our analysis, we identify five shared context categories: social context, location, time, physical context, and user context. In addition, we compare the context models with the context elements considered in the discourse on intelligent systems and find that the models do not properly represent the identified set of 3,741 unique context elements. As a result, we propose a consolidation of the findings from the 36 context models and the 3,741 unique context elements. The analysis reveals that there is a long tail of context categories that are considered only sporadically in context models. However, particularly these context elements in the long tail may be necessary for improving intelligent systems' context awareness

    SmartPM: automatic adaptation of dynamic processes at run-time

    Get PDF
    The research activity outlined in this thesis is devoted to define a general approach, a concrete architecture and a prototype Process Management System (PMS) for the automated adaptation of dynamic processes at run-time, on the basis of a declarative specification of process tasks and relying on well-established reasoning about actions and planning techniques. The purpose is to demonstrate that the combination of procedural and imperative models with declarative elements, along with the exploitation of techniques from the field of artificial intelligence (AI), such as Situation Calculus, IndiGolog and automated planning, can increase the ability of existing PMSs of supporting dynamic processes. To this end, a prototype PMS named SmartPM, which is specifically tailored for supporting collaborative work of process participants during pervasive scenarios, has been developed. The adaptation mechanism deployed on SmartPM is based on execution monitoring for detecting failures at run-time, which does not require the definition of the adaptation strategy in the process itself (as most of the current approaches do), and on automatic planning techniques for the synthesis of the recovery procedure

    Developing a Prototype of an Internet-based Decision Aid to Assist Student Survivors of Sexual Assault at Colleges and Universities with Making Informed Choices about Seeking Care and Pursuing Justice in Real-time.

    Get PDF
    abstract: Sexual assault at colleges and universities in the United States is a significant health and human rights issue that impacts somewhere between one-in-four and one-in-five students. Despite the alarmingly high burden, overall rates of disclosing to crisis, health, and victim services, and reporting to schools and law enforcement remain low. In order to buffer students from associated short- and long-term harm, and help them reestablish safety and pursue justice, empirically-supported, innovative, and trauma-informed secondary prevention strategies are needed. To address this pressing issue, the current study used a trauma-informed, feminist community research approach to develop and design a prototype of an internet-based decision aid specifically tailored to assist students at Arizona State University who experience sexual assault with making informed choices about reporting and seeking care, advocacy, and support on and off campus. Results from preliminary alpha testing of the tool showed that: 1. It is feasible to adapt decision aids for use with the target population, and 2. While aspects of the tool can be improved during the next phases of redrafting and redesign, members of the target population find it to be acceptable, comprehensible, and usable.Dissertation/ThesisDoctoral Dissertation Global Health 201

    Gender and the Enactment of Suicide Bombings by Boko Haram

    Get PDF
    The Boko Haram terror group has utilized more women as suicide bombers than any other group in history. While prior research has examined why this phenomenon is occurring, and what makes Boko Haram a unique terror group, the present study examines how these attacks are being perpetrated, or enacted, by the female bombers. Utilizing the Global Terrorism Database (GTD), which is the largest terrorism incident database available, the study examined the incidents of female suicide bombings perpetrated by Boko Haram. The open-sourced citations provided by the GTD were compiled and turned into a complementary qualitative dataset. Overall, there were 151 incidents of female suicide bombings by Boko Haram between 2014 and 2017, of which 102 were included in the final sample for the study. Results of content analysis indicate that there are similarities between the perpetration of suicide bombings by females and other acts of crime, violence, and terrorist acts committed by other women, but there are also distinct differences. The cultural and social constructs of the region create a unique situation for Boko Haram compared to other terrorist groups that have deployed the female suicide bombing tactic; however, these features also make it difficult to flesh out the overarching issues of coercion, victimization, and kidnapping that the group heavily relies on. Though the ways in which the suicide attacks are enacted can be examined, at this point, it is still unclear whether the young women and girls perpetrating the attacks are acting out of their own volition, high levels of coercion, or a blend of the two

    Use of early biological detection data by decision makers to minimize the consequences of no-notice infectious disease outbreaks

    Get PDF
    New and reemerging diseases pose significant challenges to the United States. Providing decision makers with data early to help characterize the event may allow for better-informed decisions and the initiation of appropriate responses. There is a limited amount of literature on the factors that lead decision makers to implement the appropriate response. The purpose of this study was to generate knowledge about the use of early biological detection by decision makers. A case study design of two cities was employed to determine if early biological detection capability affected the decisions to implement public health interventions. Multiple methodologies were used to collect and analyze data from primary and secondary sources. A review of previous outbreaks provided insights into disease characteristics and response activities which were used to build realistic disease scenarios for use in key informant interviews. Interviews with decision makers in each of two cities were conducted to understand how early biologic data were used, the availability of data, and to determine decision making processes. Several overarching themes emerged: data types, sources, and confidence is varied among different professional types of decision makers; strong relationships support the notification of an event and assist in effective, rapid response; public relationships and the media are beneficial partners in response with ability to rapidly communicate guidance; authority for decision making is unclear during crisis; significant events initiated preparedness activities in each city; and the 2009 H1N1 experience tested the US's capability to respond to a public health crisis. Federal and local stakeholders have a role to play in improving the level of preparedness of cities for a public health emergency. At the federal level, an assessment of federally funded biological detection capabilities and an appropriate realignment of federal support based on actual threat is required to improve the capacity for our cities to rapidly respond. In addition, the federal government has a unique opportunity to identify and fund cities to participate in National Special Security Events and National Level Exercises which improves their preparedness posture as a community. Our nation's cities have the responsibility to understand their information requirements and create an infrastructure that supports appropriate decision making. This study presents a plan to help local governments assess their information requirements and create an information network

    Emerging Risks in the Marine Transportation System (MTS), 2001- 2021

    Get PDF
    How has maritime security evolved since 2001, and what challenges exist moving forward? This report provides an overview of the current state of maritime security with an emphasis on port security. It examines new risks that have arisen over the last twenty years, the different types of security challenges these risks pose, and how practitioners can better navigate these challenges. Building on interviews with 37 individuals immersed in maritime security protocols, we identify five major challenges in the modern maritime security environment: (1) new domains for exploitation, (2) big data and information processing, (3) attribution challenges, (4) technological innovations, and (5) globalization. We explore how these challenges increase the risk of small-scale, high-probability incidents against an increasingly vulnerable Marine Transportation System (MTS). We conclude by summarizing several measures that can improve resilience-building and mitigate these risks

    WEHST: Wearable Engine for Human-Mediated Telepresence

    Get PDF
    This dissertation reports on the industrial design of a wearable computational device created to enable better emergency medical intervention for situations where electronic remote assistance is necessary. The design created for this doctoral project, which assists practices by paramedics with mandates for search-and-rescue (SAR) in hazardous environments, contributes to the field of human-mediated teleparamedicine (HMTPM). Ethnographic and industrial design aspects of this research considered the intricate relationships at play in search-and-rescue operations, which lead to the design of the system created for this project known as WEHST: Wearable Engine for Human-Mediated Telepresence. Three case studies of different teams were carried out, each focusing on making improvements to the practices of teams of paramedics and search-and-rescue technicians who use combinations of ambulance, airplane, and helicopter transport in specific chemical, biological, radioactive, nuclear and explosive (CBRNE) scenarios. The three paramedicine groups included are the Canadian Air Force 442 Rescue Squadron, Nelson Search and Rescue, and the British Columbia Ambulance Service Infant Transport Team. Data was gathered over a seven-year period through a variety of methods including observation, interviews, examination of documents, and industrial design. The data collected included physiological, social, technical, and ecological information about the rescuers. Actor-network theory guided the research design, data analysis, and design synthesis. All of this leads to the creation of the WEHST system. As identified, the WEHST design created in this dissertation project addresses the difficulty case-study participants found in using their radios in hazardous settings. As the research identified, a means of controlling these radios without depending on hands, voice, or speech would greatly improve communication, as would wearing sensors and other computing resources better linking operators, radios, and environments. WEHST responds to this need. WEHST is an instance of industrial design for a wearable “engine” for human-situated telepresence that includes eight interoperable families of wearable electronic modules and accompanying textiles. These make up a platform technology for modular, scalable and adaptable toolsets for field practice, pedagogy, or research. This document details the considerations that went into the creation of the WEHST design

    Information Refinement Technologies for Crisis Informatics: User Expectations and Design Implications for Social Media and Mobile Apps in Crises

    Get PDF
    In the past 20 years, mobile technologies and social media have not only been established in everyday life, but also in crises, disasters, and emergencies. Especially large-scale events, such as 2012 Hurricane Sandy or the 2013 European Floods, showed that citizens are not passive victims but active participants utilizing mobile and social information and communication technologies (ICT) for crisis response (Reuter, Hughes, et al., 2018). Accordingly, the research field of crisis informatics emerged as a multidisciplinary field which combines computing and social science knowledge of disasters and is rooted in disciplines such as human-computer interaction (HCI), computer science (CS), computer supported cooperative work (CSCW), and information systems (IS). While citizens use personal ICT to respond to a disaster to cope with uncertainty, emergency services such as fire and police departments started using available online data to increase situational awareness and improve decision making for a better crisis response (Palen & Anderson, 2016). When looking at even larger crises, such as the ongoing COVID-19 pandemic, it becomes apparent the challenges of crisis informatics are amplified (Xie et al., 2020). Notably, information is often not available in perfect shape to assist crisis response: the dissemination of high-volume, heterogeneous and highly semantic data by citizens, often referred to as big social data (Olshannikova et al., 2017), poses challenges for emergency services in terms of access, quality and quantity of information. In order to achieve situational awareness or even actionable information, meaning the right information for the right person at the right time (Zade et al., 2018), information must be refined according to event-based factors, organizational requirements, societal boundary conditions and technical feasibility. In order to research the topic of information refinement, this dissertation combines the methodological framework of design case studies (Wulf et al., 2011) with principles of design science research (Hevner et al., 2004). These extended design case studies consist of four phases, each contributing to research with distinct results. This thesis first reviews existing research on use, role, and perception patterns in crisis informatics, emphasizing the increasing potentials of public participation in crisis response using social media. Then, empirical studies conducted with the German population reveal positive attitudes and increasing use of mobile and social technologies during crises, but also highlight barriers of use and expectations towards emergency services to monitor and interact in media. The findings led to the design of innovative ICT artefacts, including visual guidelines for citizens’ use of social media in emergencies (SMG), an emergency service web interface for aggregating mobile and social data (ESI), an efficient algorithm for detecting relevant information in social media (SMO), and a mobile app for bidirectional communication between emergency services and citizens (112.social). The evaluation of artefacts involved the participation of end-users in the application field of crisis management, pointing out potentials for future improvements and research potentials. The thesis concludes with a framework on information refinement for crisis informatics, integrating event-based, organizational, societal, and technological perspectives
    corecore