652 research outputs found

    Managing Visibility and Validity of Distress Calls with an Ad-Hoc SOS System

    Get PDF
    The availability of ICT services can be severely disrupted in the aftermath of disasters. Ad-hoc assemblages of communication technology have the potential to bridge such breakdowns. This article investigates the use of an ad-hoc system for sending SOS signals in a large-scale exercise that simulated a terrorist attack. In this context, we found that the sensitivity that was introduced by the adversarial nature of the situation posed unexpected challenges for our approach, as giving away one's location in the immediate danger of a terrorist attack became an issue both for first responders and the affected people in the area. We show how practices of calling for help and reacting to help calls can be affected by such a system and affect the management of the visibility and validity of SOS calls, implying a need for further negotiation in situations where communication is sensitive and technically restrained

    Development and evaluation of smartphone-based ITS applications for vehicular networks

    Full text link
    [ES] Una de las áreas de investigación que está recibiendo más atención recientemente es la de vehículos autónomos. Los investigadores están en este momento centrados en el tercer de los cinco niveles de autonomía, los cuales son: asistencia en la conducción, automatización parcial, automatización condicional, alta automatización y automatización completa. A pesar de los rápidos progresos que están habiendo en este campo, la adopción de estas soluciones llevará tiempo no sólo debido a cuestiones legales, sino también por el hecho de que los avances tecnológicos se enfrentan a un lento respaldo por parte de los fabricantes. Además, la baja tasa de renovación de vehículos de carretera, dificulta el despliegue de tecnologías innovadoras, como es el caso de la red vehicular. Ocho años después de la introducción de la norma 802.11p para la comunicación vehicular del Instituto de Ingenieros Eléctricos y Electrónicos (IIEE), los vehículos que se usan a diario todavía carecen de la capacidad de comunicarse entre sí. Este hecho impide el uso de las muchas aplicaciones de seguridad del Sistema de Inteligencia de Transporte (SIT) que aprovecha la red vehicular para el intercambio de datos. La forma obvia de manejar este problema es poner las tecnologías disponibles a la disposición de los usuarios comunes para desarrollar soluciones que se puedan implementar fácilmente y, además, económicas. Por esta razón, trasladamos nuestra atención a los dispositivos inteligentes, especialmente a los teléfonos inteligentes, los cuales han recorrido un largo camino desde la primera introducción de teléfonos móviles a finales del siglo XX. Hoy en día casi todos llevan uno en su bolsillo a donde sea que vayan, permitiéndoles no sólo hacer llamadas, sino también medir y controlar diferentes parámetros con la ayuda de los muchos sensores integrados que están disponibles para estos dispositivos compactos pero potentes. Nuestro objetivo es estudiar los efectos de la integración de los teléfonos inteligentes a la red vehicular para desarrollar aplicaciones de seguridad del SIT. La elección de los teléfonos inteligentes aquí no solo está justificada por su amplia disponibilidad y uso, sino también porque están evolucionando hacia terminales de alto rendimiento con microprocesadores de múltiples núcleos cargados dotados de un grupo suficientemente diverso de sensores. En esta tesis proponemos tres diferentes aplicaciones de seguridad SIT para teléfonos inteligentes, diseñados para aprovechar el entorno de red vehicular: una aplicación de generación de advertencia llamada Messiah que alerta a los conductores de la presencia de vehículos de emergencia en las cercanías; una aplicación de Advertencia de Colisión Frontal (ACF) que advierte a los conductores si no se mantiene la distancia de seguridad mínima entre el vehículo que va delante y el que lo sigue; y, por último, una aplicación que tiene como objetivo ayudar a los conductores con asistencia visual durante el adelantamiento, llamada EYES. Todas estas aplicaciones han sido desarrolladas para la plataforma Android, y dependen de la transmisión de datos entre vehículos. Dado que los vehículos que utilizamos día a día no admiten la posibilidad de comunicarse entre sí, también diseñamos GRCBox, que es una unidad integrada de bajo coste que permite la comunicación del Vehículo a Todo (V2X). A partir de nuestro estudio de aplicaciones para dispositivos móviles diseñados para redes vehiculares, descubrimos que el uso de teléfonos inteligentes proporciona una nueva dirección para la investigación relacionada con SIT y redes vehiculares al permitir la adopción rápida de las soluciones existentes, donde los usuarios pueden descargar y usar las aplicaciones con sólo un clic a un botón. Al mismo tiempo, la portabilidad y compacidad de los dispositivos los hace limitados en términos de velocidad, potencia de procesamiento y precisi[CA] Una de les àrees d'investigació que està rebent més atenció recentment és la de vehicles autònoms. Els investigadores estan en este moment centrats en el tercer dels cinc nivells d'autonomia, els quals són: assistència en la conducció, automatització parcial, automatització condicional, alta automatització i automatització completa. Malgrat els ràpids progressos que s'estan donant en este camp, l'adopció d'estes solucions portarà temps no sols degut a qüestions legals, sinó també pel fet que els avanços tecnològics s'enfronten a un lent recolzament per part dels fabricants. A més a més, la baixa taxa de renovació de vehicles de carretera, dificulta el desplegament de tecnologies innovadores com és el cas de la xarxa vehicular. Huit anys després de la introducció de la norma 802.11p per a la comunicació vehicular de l'Institut d'Enginyers Elèctrics i Electrònics (IEEE), els vehicles que s'utilitzen a diari encara manquen de la capacitat de comunicar-se entre sí. Este fet impedeix l'ús de les moltes aplicacions de seguretat del Sistema d'Intel·ligència de Transport (SIT) que aprofita la xarxa vehicular per a l'intercanvi de dades. La forma òbvia de tractar aquest problema és posar les tecnologies disponibles a la disposició dels usuaris comuns per a desenvolupar solucions que es puguen implementar fàcilment, còmodes d'adoptar i, a més a més, econòmiques. Per aquesta raó, traslladem la nostra atenció als dispositius intel·ligents, especialment als telèfons intel·ligents, els quals han recorregut un llarg camí des de la primera introducció de telèfons mòbils a finals del segle XX. Hui en dia quasi tots porten un en la butxaca on siga que vagen, permetent-los no sols fer cridades, sinó també mesurar i controlar diferents paràmetres amb l'ajuda dels molts sensors integrats que estan disponibles per a estos dispositius compactes però potents. El nostre objectiu és estudiar els efectes de la integració dels telèfons intel·ligents a la xarxa vehicular per a desenvolupar aplicacions de seguretat del SIT. L'elecció dels telèfons intel·ligents ací no està sols justificada per la seua àmplia disponibilitat i ús, sinó també perquè estan evolucionant cap a terminals d'alt rendiment amb microprocessadors de múltiples nuclis dotats amb un grup suficientment divers de sensors. En esta tesi proposem tres diferents aplicacions de seguretat SIT per a telèfons intel·ligents, dissenyats per a aprofitar l'entorn de xarxa vehicular: una aplicació de generació d'advertència anomenada Messiah que alerta els conductors de la presència de vehicles d'emergència en les proximitats; una aplicació Advertència de Col·lisió Frontal (ACF) que adverteix els conductors si no mantenen la distància de seguretat mínima entre el vehicle que va davant i el que el segueix; i, per últim, una aplicació que té com objectiu ajudar els conductors amb assistència visual durant l'avançament, anomenat EYES. Totes aquestes aplicacions han sigut desenvolupades per a la plataforma Android, i depenen de la transmissió de dades entre vehicles. Donat que els vehicles que utilitzem a diari no admeten la possibilitat de comunicar-se entre sí, també dissenyem GRCBox, que és una unitat integrada de baix cost que permet la comunicació de Vechicle a Tot (V2X). A partir del nostre estudi d'aplicacions per a dispositius mòbils dissenyats per a xarxes vehiculars, descobrim que l'ús de telèfons intel·ligents proporciona una nova direcció per a la investigació relacionada amb SIT i xarxes vehiculars al permetre l'adopció ràpida de les solucions existents, on els usuaris poden descarregar i utilitzar les aplicacions amb un sol clic a un botó. Però al mateix temps, la portabilitat i la compacitat dels dispositius els fa limitats en termes de velocitat, potència de processament i precisió del sensor integrat, cosa que afecta al rendiment de les aplicacions.[EN] One of the research areas that is receiving a lot of attention recently is autonomous vehicles. Researchers are currently focused on the third level of autonomy out of the five levels, which are: drive assistance, partial automation, conditional automation, high automation, and full automation. Even though rapid progress is being made in this field, the adoption of these solutions will take time not only due to legal issues, but also due to the fact that technological improvements face slow endorsement by manufacturers. Also, the slow renewal rate of vehicles on road hinders the deployment of novel technologies, as is the case of Vehicular Networks (VNs). Eight years after the introduction of the IEEE 802.11p standard for vehicular communication, vehicles used on a daily basis still lack the capability of communicating with one other. This fact impedes the use of the many ITS safety applications that take advantage of VNs for data exchange. The obvious way to handle this problem is to use the available technologies at the disposal of common users to develop solutions that are easily deployable, effortless to adopt, and moreover, cost effective. For this reason we shift our attention to smart devices, specially smartphones, which have come a long way since the first introduction of mobile phones in the late 20th century. Nowadays, nearly everyone carries one in their pocket anywhere they go, allowing them to not only make calls, but also to measure and monitor different parameters with the help of the many on-board sensors that are available to these compact yet powerful devices. Our objective is to study the effects of integrating smartphones to vehicular networks, to develop ITS safety applications. The choice of smartphones here is not only justified by their wide availability and use, but also because they are evolving towards high performance terminals with multi-core microprocessors packed with a sufficiently diverse group of sensors. In this thesis we propose three different ITS safety applications for smartphones, designed to take advantage of the vehicular network environment: a warning generation application called Messiah that alerts drivers of the presence of emergency vehicles in close proximity; a FCW application which warns drivers if a minimum safe distance is not maintained between the vehicle ahead and the one following it; and lastly an application that aims to aid drivers with visual assistance while overtaking, named EYES. All these applications have been developed for the Android platform, and are dependent on the data transmission among vehicles. Since vehicles we use on a day to day basis still do not accommodate the possibility to communicate with one another, we also designed the GRCBox, which is a low cost on-board unit that supports V2X communication. From our study of applications for mobile devices designed for VNs, we found that the use of smartphones provides a new direction to research related to ITS and VNs by allowing a quick adoption of the existing solutions, where users are able to download and use applications just by one click of a button. But at the same time, the portability and compactness of the devices makes them limited in terms of speed, processing power, and accuracy of the on-board sensor, thus affecting the performance of the applications. In our case, the simpler Messiah application performed very well, while the EYES application that is dependent on GPS data, and the FCW application which required heavy processing and use of the camera due to its dependence on plate recognition, were affected by the hardware limitations of the smartphones.Patra, S. (2019). Development and evaluation of smartphone-based ITS applications for vehicular networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/124058TESI

    Psychodermatology 2.0. towards improved assessment and effective internet-based interventions

    Get PDF
    Contains fulltext : 169320.pdf (publisher's version ) (Open Access)Radboud University, 10 mei 2017Promotores : Evers, A.W.M., Kerkhof, P.C.M. van de Co-promotor : Middendorp, H. va

    Risk attitudes and safety culture in the English fire and rescue services

    Get PDF
    In the ten year period between 2004 and 2013 the UK lost 13 operational, and one non-operational, firefighters at fires, a relatively large number in relation to previous losses. These fatalities occurred during a period in which fire fatalities of members of the public were at an all‐time low but fire and rescue services (FRS) and their staff were being accused in the media of becoming risk averse. This research was focussed on investigating the risk attitudes and safety culture in the English fire and rescue services. The research question asked how the safety culture manifests itself in the English fire and rescue service and what are its implications? A mixed approach to the research was adopted utilising both quantitative and qualitative methods. The research strategy was inductive using a multiple case study. A safety culture questionnaire was designed and then piloted in one FRS with the responses being subjected to a factor analysis the results of which indicated there were four dimensions: management, procedures, competence, and work pressures. The final version of the questionnaire was then distributed across five FRSs from which 845 were returned, of which 823 were used in a series of statistical analyses. Two independent variables were used in the analysis; the first consisted of the individual FRSs, the second consisted of three groups based on Schein’s three generic subcultures of executive, designer and operator. These were aligned with principal officers (PO), senior officers (SO), and Watch based (WB) staff respectively. The analysis of the completed questionnaires indicated that the WB group had a negative attitude towards their FRS safety culture, while the SO and PO groups had a more positive attitude with the PO the most positive. All three groups were significantly different to each other. In conducting the qualitative part of the mixed methods the researcher rode with three Watches at a station in each of three FRSs to observe the behaviour of WB staff and attending SOs at incidents and during their daily activities. During the course of the fieldwork nineteen members across all of the participating FRSs were interviewed, and twenty‐four focus groups were conducted. What was clear was that the competence based training system was not popular with WB staff who believed it to be too bureaucratic, whilst SOs and POs believed that it had not fulfilled their expectations of what it would deliver. There were also concerns expressed that the promotion system, associated with the competence‐based training, was producing managers and not the leaders required on the incident ground. It was concluded that safety culture within the FRS is associated with the systems, policies and procedures reflective of FRS management’s level of risk tolerance producing a rule-based decision‐making bureaucracy; this level of risk tolerance then influences how operational firefighters operate on the incident ground. In the world of the operational firefighter a typical incident, which by its very nature is a temporary event, is laden with uncertainty, complexity and in which all the potential risks may not yet have been identified with decision‐making being focussed on problem‐solving. FRS personnel find themselves operating in a risk climate in which they build temporary command structures, construct temporary processes and controls reflecting the incident commander’s risk appetite for the purpose of moving towards operating in a safety climate in which to resolve the incident. The combination of the FRS’s safety culture and the operational firefighter’s risk climate determine what the researcher has defined as the FRS operational culture

    Supporting healthcare staff after patient safety incidents: An exploration of policy, practice, and terminology:“There’s no point having a rhetoric of concern if nothing will be done”

    Get PDF
    Background and objectives: This project investigates the policies informing emotional and psychological support for healthcare staff after involvement in patient safety incidents, the support provided in practice, and the terminology used to describe those involved. Method: In a qualitative study design, semi-structured interviews were conducted with 27 healthcare professionals in England, with management, supervisory, or policy responsibility, to answer two research questions: 1) the policies, protocols, and practices they were aware of that aim to support healthcare personnel in their organisation who have experienced unanticipated adverse or near miss medical events, and 2) their views about the term “second victim”. Thematic analysis was chosen to analyse the interview data. Findings: Four themes were developed: 1) Severe and enduring impact; 2) Absence of policies; 3) No certainty of support; 4) Language undermines support. A notable gap exists between rhetoric about staff wellbeing, including in national and international healthcare policy reports, and the rarity of structured support after patient safety incidents (PSI). Staff are impacted both by the incidents and by the way their organisation treats them. Informal support depends upon the goodwill of close colleagues, and may not be available. There is an imbalance between the high expectations placed on staff and the support resources they can access. Routine language usage in healthcare negatively impacts support provision. The established “second victim” concept accurately reflects the feelings of staff affected by PSI, but is not a stable construct, has unwelcome connotations, and causes offence to some patient representatives. Conclusions: There are many national and international policy recommendations to support staff emotionally and psychologically after PSI. A small number of policies require support provision, without stipulating how. Support programmes known to exist are mostly in North America. In the UK, support is lacking, and necessary components of structured support are identifie

    Strangers, Aliens, Foreigners

    Get PDF
    To contend with others is to contend with ourselves. The way we “other” others, by identifying and reinforcing social distance, is more a product of who we are and who we want to be than it is about “others.” Strangers, Aliens, Foreignersquestions such consolidation and polarization of identities in representations ranging from migrants and refugees, to terrorist labels, to constructions of the local. Inclusive and exclusive identities are observed through often arbitrary yet strategically ambiguous lines of class, religion, race, ethnicity, nationality, social status, and geography. However, despite any arbitrariness in definition, there are very real consequences for the emotional, physical, and psychological well-being of those constructed as “the other”, as well as legal governance implications involving human rights and wider sociopolitical ethics. From practical, professional, and political-philosophical points of view, this collection examines what it means to be, or to construct, the Strangers, Aliens, Foreigners. Contributors are David Elijah Bell, Adina Camenisch, Hanna Jagtenberg, Seraina Müller, Lana Pavić, Michelle Ryan, Marissa Sonnis-Bell and Tomasso Trilló

    WeObserve Cookbook

    Get PDF
    The WeObserve Cookbook has been especially designed for groups or individuals who are leading or will lead Citizen Observatory projects and initiatives. It provides lessons on best practice and guides users through resources such as tools, scientific papers, training materials and networks. The guidance, tools, resources and insights captured in the Cookbook have been produced, tested and reviewed by the WeObserve project consortium and/or the WeObserve Communities of Practice. Many of the resources are well-documented and have been widely used in citizen science and citizen observatory projects. Most descriptions include a key reference, so you can explore more about their background or their application

    Mediated Bordering: Eurosur, the Refugee Boat, and the Construction of an External EU Border

    Get PDF
    The external border of the EU remains under permanent construction. The author engages with two of its primary building sites - the European Border Surveillance System (Eurosur) and the Refugee Boat. She analyzes how the function and quality of the EU's current political border is crafted, shaped, produced and eventually stabilized through these two mediators. Eurosur and the Refugee Boat mediate a level of Europeanization which has hitherto - and would otherwise have - been impossible. While Eurosur mobilizes the limits of border policing in various ways, the Refugee Boat functions as the vacillating European Other to legitimize both control and humanitarian interventions. The study shows the specific, if not constitutive, ambivalences of EU border policies, and explores the emergence of viapolitics

    Nature-inspired survivability: Prey-inspired survivability countermeasures for cloud computing security challenges

    Get PDF
    As cloud computing environments become complex, adversaries have become highly sophisticated and unpredictable. Moreover, they can easily increase attack power and persist longer before detection. Uncertain malicious actions, latent risks, Unobserved or Unobservable risks (UUURs) characterise this new threat domain. This thesis proposes prey-inspired survivability to address unpredictable security challenges borne out of UUURs. While survivability is a well-addressed phenomenon in non-extinct prey animals, applying prey survivability to cloud computing directly is challenging due to contradicting end goals. How to manage evolving survivability goals and requirements under contradicting environmental conditions adds to the challenges. To address these challenges, this thesis proposes a holistic taxonomy which integrate multiple and disparate perspectives of cloud security challenges. In addition, it proposes the TRIZ (Teorija Rezbenija Izobretatelskib Zadach) to derive prey-inspired solutions through resolving contradiction. First, it develops a 3-step process to facilitate interdomain transfer of concepts from nature to cloud. Moreover, TRIZ’s generic approach suggests specific solutions for cloud computing survivability. Then, the thesis presents the conceptual prey-inspired cloud computing survivability framework (Pi-CCSF), built upon TRIZ derived solutions. The framework run-time is pushed to the user-space to support evolving survivability design goals. Furthermore, a target-based decision-making technique (TBDM) is proposed to manage survivability decisions. To evaluate the prey-inspired survivability concept, Pi-CCSF simulator is developed and implemented. Evaluation results shows that escalating survivability actions improve the vitality of vulnerable and compromised virtual machines (VMs) by 5% and dramatically improve their overall survivability. Hypothesis testing conclusively supports the hypothesis that the escalation mechanisms can be applied to enhance the survivability of cloud computing systems. Numeric analysis of TBDM shows that by considering survivability preferences and attitudes (these directly impacts survivability actions), the TBDM method brings unpredictable survivability information closer to decision processes. This enables efficient execution of variable escalating survivability actions, which enables the Pi-CCSF’s decision system (DS) to focus upon decisions that achieve survivability outcomes under unpredictability imposed by UUUR
    corecore