11 research outputs found

    Developing Crisis Training Software for Local Governments – From User Needs to Generic Requirements

    Get PDF
    In this paper we analyze and present the generic requirements identified for a software aiming at supporting crisis management training in local governments. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. Moreover, the requirements are mapped to problems as well as opportunities. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. In our work we applied a design science approach and the artifact presented in this paper is a list of generic requirement. The presented requirements and the systems development process used, provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training

    A game prototype for understanding the safety issues of a lifeboat launch

    Get PDF
    © 2018 The Author(s) Novel, advanced game techniques provide us with new possibilities to mimic a complicated training process, with the added benefit of enhanced safety. In this paper, we design and implement a 3D game with the support of virtual reality equipment which imitates the process of a lifeboat launch, involving both tractor manoeuvres and boat operations. It is a complex but vital process which can save lives at sea but also has many potential hazards. The primary objective of the game is to allow novices to better understand the sequence of the operations and manage the potential risks which may occur during the launch process. Additionally, the game has been promoted to the general public for educational purposes and to raise awareness of the safety issues involved. The key modules of the game are designed based on physical simulations to give the players enhanced plausible cognition and enjoyable interaction. We conducted two case studies for the two purposes of the games: one for training with volunteers without launching experience and the other for public awareness of the potential hazards with young children. The game is proven to be very promising for future professional training, and it serves the educational purpose of awareness of the safety issues for general public while being entertaining

    Hand gesture-based interactive puppetry system to assist storytelling for children

    Get PDF
    © 2016 The Author(s)Digital techniques have been used to assist narrative and storytelling, especially in many pedagogical practices. With the rapid development of HCI techniques, saturated with digital media in their daily lives, young children, demands more interactive learning methods and meaningful immersive learning experiences. In this paper, we propose a novel hand gesture-based puppetry storytelling system which provides a more intuitive and natural human computer interaction method for young children to develop narrative ability in virtual story world. Depth motion sensing and hand gestures control technology is utilized in the implementation of user-friendly interaction. Young players could intuitively use hand gestures to manipulate virtual puppet to perform story and interact with different items in virtual environment to assist narration. Based on the result of the evaluation, this novel digital storytelling system shows positive pedagogical functions on children’s narrating ability as well as the competencies of cognitive and motor coordination. The usability of the system is preliminary examined in our test, and the results which showed that young children can benefit from playing with Puppet Narrator

    Data Stream Clustering for Real-Time Anomaly Detection: An Application to Insider Threats

    Get PDF
    Insider threat detection is an emergent concern for academia, industries, and governments due to the growing number of insider incidents in recent years. The continuous streaming of unbounded data coming from various sources in an organisation, typically in a high velocity, leads to a typical Big Data computational problem. The malicious insider threat refers to anomalous behaviour(s) (outliers) that deviate from the normal baseline of a data stream. The absence of previously logged activities executed by users shapes the insider threat detection mechanism into an unsupervised anomaly detection approach over a data stream. A common shortcoming in the existing data mining approaches to detect insider threats is the high number of false alarms/positives (FPs). To handle the Big Data issue and to address the shortcoming, we propose a streaming anomaly detection approach, namely Ensemble of Random subspace Anomaly detectors In Data Streams (E-RAIDS), for insider threat detection. E-RAIDS learns an ensemble of p established outlier detection techniques [Micro-cluster-based Continuous Outlier Detection (MCOD) or Anytime Outlier Detection (AnyOut)] which employ clustering over continuous data streams. Each model of the p models learns from a random feature subspace to detect local outliers, which might not be detected over the whole feature space. E-RAIDS introduces an aggregate component that combines the results from the p feature subspaces, in order to confirm whether to generate an alarm at each window iteration. The merit of E-RAIDS is that it defines a survival factor and a vote factor to address the shortcoming of high number of FPs. Experiments on E-RAIDS-MCOD and E-RAIDS-AnyOut are carried out, on synthetic data sets including malicious insider threat scenarios generated at Carnegie Mellon University, to test the effectiveness of voting feature subspaces, and the capability to detect (more than one)-behaviour-all-threat in real-time. The results show that E-RAIDS-MCOD reports the highest F1 measure and less number of false alarm = 0 compared to E-RAIDS-AnyOut, as well as it attains to detect approximately all the insider threats in real-time

    A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks

    No full text

    Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research

    No full text
    Part 2: Human Aspects of SecurityInternational audienceInsider security breaches in organizations have been identified as a pressing problem for academics and practitioners. The literature generally addresses this problem by focusing on the compliance of human behavior to stated policy or the conformance with organizational culture. The cultural stance and resultant activities of organizational insiders are key determinants of information security. However, whilst compliance with security policies and regulations is of great importance, the very structure of human activities that facilitates or hinders such compliance have seldom appeared in the literature. In this paper we present a human activity model that captures different aspects of a security culture. The model elucidates the patterns of behavior in organizations. Applying the model before and after an insider security breach allows us to make salient, critical areas that need attention
    corecore