13,535 research outputs found
Enabling pervasive computing with smart phones
The authors discuss their experience with a number of mobile telephony projects carried out in the context of the European Union Information Society Technologies research program, which aims to develop mobile information services. They identify areas where use of smart phones can enable pervasive computing and offer practical advice in terms of lessons learned. To this end, they first look at the mobile telephone as * the end point of a mobile information service,* the control device for ubiquitous systems management and configuration,* the networking hub for personal and body area networks, and* identification tokens.They conclude with a discussion of business and practical issues that play a significant role in deploying research systems in realistic situations
Exploratory Study of the Privacy Extension for System Theoretic Process Analysis (STPA-Priv) to elicit Privacy Risks in eHealth
Context: System Theoretic Process Analysis for Privacy (STPA-Priv) is a novel
privacy risk elicitation method using a top down approach. It has not gotten
very much attention but may offer a convenient structured approach and
generation of additional artifacts compared to other methods. Aim: The aim of
this exploratory study is to find out what benefits the privacy risk
elicitation method STPA-Priv has and to explain how the method can be used.
Method: Therefore we apply STPA-Priv to a real world health scenario that
involves a smart glucose measurement device used by children. Different kinds
of data from the smart device including location data should be shared with the
parents, physicians, and urban planners. This makes it a sociotechnical system
that offers adequate and complex privacy risks to be found. Results: We find
out that STPA-Priv is a structured method for privacy analysis and finds
complex privacy risks. The method is supported by a tool called XSTAMPP which
makes the analysis and its results more profound. Additionally, we learn that
an iterative application of the steps might be necessary to find more privacy
risks when more information about the system is available later. Conclusions:
STPA-Priv helps to identify complex privacy risks that are derived from
sociotechnical interactions in a system. It also outputs privacy constraints
that are to be enforced by the system to ensure privacy.Comment: author's post-prin
Information and communication in a networked infosphere: a review of concepts and application in social branding
This paper aims at providing a contribution to the comprehensive review of the impact of information and communication, and their supporting technologies, in the current transformation of human life in the infosphere. The paper also offers an ex- ample of the power of new social approaches to the use of information and commu- nication technologies to foster new working models in organizations by presenting the main outcomes of a research project on social branding. A discussion about some trends of the future impact of new information and communication technologies in the infosphere is also included
Enabling IoT ecosystems through platform interoperability
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broadly accepted IoT ecosystems. The BIG IoT (Bridging the Interoperability Gap of the IoT) project aims to ignite an IoT ecosystem as part of the European Platforms Initiative. As part of the project, researchers have devised an IoT ecosystem architecture. It employs five interoperability patterns that enable cross-platform interoperability and can help establish successful IoT ecosystems.Peer ReviewedPostprint (author's final draft
Digitalization and Innovation
Developments in digital technology offer new opportunities to design new products and services. However, creating such digitalized products and services often creates new problems and challenges to firms that are trying to innovate. In this essay, we analyze the impact of digitalization of products and services on innovations. In particular, we argue that digitalization of products will lead to an emergence of new layered product architecture. The layered architecture is characterized by its generative design rules that connect loosely coupled heterogeneous layers. It is pregnant with the potential of unbounded innovations. The new product architecture will require organizations to adopt a new organizing logic of innovation that we dubbed as doubly distributed innovation network. Based on this analysis, we propose five key issues that future researchers need to explore.innovation, innovation, product architecture, design rules
Persuasive design of a mobile energy conservation game with direct feedback and social cues
Pervasive gaming has the potential of transforming the
home into a persuasive environment in which the user can
learn about appliances and their electricity consumption.
Power Explorer is a mobile game with a special sensing
approach that provides real-time electricity measurements
and feedback when the user switches on and off devices in
the home. The game was developed based on persuasive
principles to provide an engaging means to learn about
energy with positive and negative feedback and social
feedback from peers on real energy actions in the home. We
present the design and rationale of this game and discuss
how pervasive games can be viewed from a persuasive and
learning point of view
Mediating exposure in public interactions
Mobile computing and public interactions together open
up a new range of challenges in interaction design. To
date a very gregarious model of interaction has been
assumed. However, the public setting will invoke feelings
of shyness and a desire to control the personal exposure
associated with interactions. In this paper we discuss
these issues and our initial tests of a system which affords
a control beyond "engage or don't engage"
International conference on software engineering and knowledge engineering: Session chair
The Thirtieth International Conference on Software Engineering and Knowledge Engineering (SEKE 2018) will be held at the Hotel Pullman, San Francisco Bay, USA, from July 1 to July 3, 2018. SEKE2018 will also be dedicated in memory of Professor Lofti Zadeh, a great scholar, pioneer and leader in fuzzy sets theory and soft computing.
The conference aims at bringing together experts in software engineering and knowledge engineering to discuss on relevant results in either software engineering or knowledge engineering or both. Special emphasis will be put on the transference of methods between both domains. The theme this year is soft computing in software engineering & knowledge engineering. Submission of papers and demos are both welcome
Smartphones
Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones
The SATIN component system - a metamodel for engineering adaptable mobile systems
Mobile computing devices, such as personal digital assistants and mobile phones, are becoming increasingly popular, smaller, and more capable. We argue that mobile systems should be able to adapt to changing requirements and execution environments. Adaptation requires the ability-to reconfigure the deployed code base on a mobile device. Such reconfiguration is considerably simplified if mobile applications are component-oriented rather than monolithic blocks of code. We present the SATIN (system adaptation targeting integrated networks) component metamodel, a lightweight local component metamodel that offers the flexible use of logical mobility primitives to reconfigure the software system by dynamically transferring code. The metamodel is implemented in the SATIN middleware system, a component-based mobile computing middleware that uses the mobility primitives defined in the metamodel to reconfigure both itself and applications that it hosts. We demonstrate the suitability of SATIN in terms of lightweightedness, flexibility, and reusability for the creation of adaptable mobile systems by using it to implement, port, and evaluate a number of existing and new applications, including an active network platform developed for satellite communication at the European space agency. These applications exhibit different aspects of adaptation and demonstrate the flexibility of the approach and the advantages gaine
- …