60,745 research outputs found

    Handyperson Scheme: feasibility and development study

    Get PDF

    Human-triggered earthquakes and their impacts on human security

    Get PDF
    A comprehensive understanding of earthquake risks in urbanized regions requires an accurate assessment of both urban vulnerabilities and earthquake hazards. Socioeconomic risks associated with human-triggered earthquakes are often misconstrued and receive little scientific, legal, and public attention. However, more than 200 damaging earthquakes, associated with industrialization and urbanization, were documented since the 20th century. This type of geohazard has impacts on human security on a regional and national level. For example, the 1989 Newcastle earthquake caused 13 deaths and US$3.5 billion damage (in 1989). The monetary loss was equivalent to 3.4 percent of Australia’s national income (GDI) or 80 percent of Australia’s GDI per capita growth of the same year. This article provides an overview of global statistics of human-triggered earthquakes. It describes how geomechanical pollution due to large-scale geoengineering activities can advance the clock of earthquakes or trigger new seismic events. Lastly, defense-oriented strategies and tactics are described, including risk mitigation measures such as urban planning adaptations and seismic hazard mapping

    Examining the issues & challenges of email & e-communications. 2nd Northumbria Witness Seminar Conference, 24-25 Oct 2007 Northumbria University, Newcastle upon Tyne.

    Get PDF
    These proceedings capture the content of the second Witness Seminar hosted by Northumbria University’s School of Computing, Engineering and Information Sciences. It followed the success of the first witness seminar in terms of its format and style but differed in that it focused on one topic - managing email and other electronic communications technologies from a records perspective. As before the witnesses were invited to share their views and opinions on a specific aspect taking as their starting point a pertinent published article(s). Three seminars explored the business, people and technology perspectives of email and e-communications, asking the following questions: What are the records management implications and challenges of doing business electronically? Are people the problem and the solution? Is technology the problem or panacea? The final seminar, 'Futurewatch', focused on moving forward, exploring new ways of working, potential new technologies and what records professionals and others need to keep on their radar screens

    EPSRC IMPACT Exhibition

    Get PDF
    This exhibition was conceived by Dunne (PI) and comprised 16 mixed-media speculative design research projects. It marked the culmination of an EPSRC-funded initiative also partly supported by NESTA. Dunne supervised and then curated the projects by staff, graduates and students of the RCA Design Interactions programme. Each was conducted in collaboration with an external research partner organisation already supported by the EPSRC. The topics covered ranged from renewable energy devices and security technologies to the emerging fields of synthetic biology and quantum computing. Dunne and an advisory panel from EPSRC and NESTA selected themes on the basis of diversity of topic, design opportunities, intellectual and creative challenges, and public relevance. Dunne invited the designers to take a radical, interrogative approach, exploring the social, ethical and political implications of the research. Each designer visited the relevant science lab, consulted with the scientists throughout the project, and participated in a one-day workshop hosted by NESTA between scientists and designers on such forms of collaboration. Designers carried out literature, journal, and project surveys before developing their projects through iterative prototypes. The exhibition, held at the RCA in 2010, was considered by EPSRC to offer a powerful insight into how today’s research might transform our experience of the world. It was reviewed in the Guardian (2010), Wired (2010) and Design Week (2010). Dunne presented ‘IMPACT!’ in conferences including the IDA Congress, ‘Design at the Edges’, Taipei (2011) and at the Wellcome Trust, London (2011). He gave a related lecture to researchers at Microsoft Research Asia, Beijing (2011). Individual exhibits from the project featured in exhibitions: Museum of Modern Art (2011), National Museum of China (2011); Z33 (2010–11); Wellcome Trust (2010–11); Saint-Étienne International Design Biennial (2010); Ars Electronica (2010); The Times Cheltenham Science Festival (2010); and V2_, Institute for the Unstable Media (2010)

    E-Voting in an ubicomp world: trust, privacy, and social implications

    Get PDF
    The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and also socially. Ubicomp evokes a near future in which humans will be surrounded by “always-on,” unobtrusive, interconnected intelligent objects where information is exchanged seamlessly. This seamless exchange of information has vast social implications, in particular the protection and management of personal information. This research project investigates the concepts of trust and privacy issues specifically related to the exchange of e-voting information when using a ubicomp type system

    Home is where the hearth is: grant recipients' views of England's home energy efficiency scheme (Warm Front)

    Get PDF
    This paper reports the results of research carried out as part of the national health impact evaluation of the Warm Front Scheme, a government initiative aimed at alleviating fuel poverty in England. Semi-structured interviews were carried out in a purposive sample of 49 households which received home energy improvements under the Scheme from five urban areas (Birmingham, Liverpool, Manchester, Newcastle, Southampton). Each household had received installation, replacement or refurbishment of the heating system and, in some cases, also insulation of the cavity wall or loft or both, and draught-proofing measures. Most householders reported improved and more controllable warmth and hot water. Many also reported perceptions of improved physical health and comfort, especially of mental health and emotional well-being and, in several cases, the easing of symptoms of chronic illness. There were reports of improved family relations, an expansion of the domestic space used during cold months, greater use of kitchens and improved nutrition, increased privacy, improved social interaction, and an increase in comfort and atmosphere within the home. Greater warmth and comfort also enhanced emotional security, and recipients were more content and at ease in their homes. However there was little evidence of substantially lower heating bills. These results provide evidence that Warm Front home energy improvements are accompanied by appreciable benefits in terms of use of living space, comfort and quality of life, physical and mental well-being, although there is only limited evidence of change in health behaviour.</p

    Just ticking the box: A social informatics model of the consequences of consent

    Get PDF
    Given the societal diffusion, proliferation and ubiquity of computerised systems and platforms, it is generally perceived by consumers that systems and eBusiness platforms often pose a threat to the privacy of their supplied information (Srnicek, 2017; Andreotti et al., 2018). Furthermore, as we see the replacement of systems that were once manual and paper-based migrate to digital processes and information systems (Lunt et al., 2019), consent in the information era is reduced to ‘Yes’ or ‘No’ option, often in the form of a tick box. Additionally, despite the arrival of the General Data Protection Regulation in 2018 as means to provide protection in relation to data processing, we argue that there is a lack of transparency in relation to the intention of this data processing and secondary data use for the purposes of research and marketing, for example. In light of this, we argue that there exists an increasingly difficult challenge to establish a mutual understanding of what consent actually is and what the wider permutations of it represents and comprehends. The lack of mutual understanding, in a digital world that is becoming increasingly reliant on the perceived benefits of acquiring and processing large sets of data (Kitchin, 2014; Breidbach et al., 2019) is deeply problematic. It is not only problematic for the consumer, but also to system developers, platform owners, and data processors alike. To this end, this paper presents a model, derived from action research, which positions the concept of consent within a socio-technical framing. This model approaches consent, in the context of digital platforms and eBusiness and how it comes to be represented in information systems, as a socio-technical construct of moral orders that imbues the feelings, convictions and aspirations of the consumer as they are engaged in the use of digital systems. We offer that consent is merely approached as an attribute in a data model, rather than relaying the communicative understanding of the consumer. This model introduces the areas of information processing systems and information communication systems as two differing interpretations within which digital platforms can be perceived. We offer these two distinctions as a mechanism to explain and, more importantly, explore the notion of the governance of consent and how this comes to be manifested in information systems

    Accuracy: The fundamental requirement for voting systems

    Get PDF
    There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identify a number of "high level" principals which are then refined either into more detailed statements or more formal constructs. Unfortunately, these approaches do not acknowledge the complexity and diversity of the contexts in which voting takes place. This paper takes a different approach by arguing that the only requirement for a voting system is that it is accurate. More detailed requirements can then be derived from this high level requirement for the particular context in which the system is implemented and deployed. A general, formal high level model for voting systems and their context is proposed. Several related definitions of accuracy for voting systems are then developed, illustrating how the term "accuracy" is in interpreted in different contexts. Finally, a context based requirement for voting system privacy is investigated as an example of deriving a subsidiary requirement from the high level requirement for accuracy

    Risks of Offline Verify PIN on Contactless Cards

    Get PDF
    Contactless card payments are being introduced around the world al- lowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require veri- fication of the cardholder’s PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which exploits contactless verify PIN to give unlimited attempts to guess the cardholder’s PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder
    corecore