This introduction to the special issue on events as platforms, networks, and communities reviews recent research on these subjects. It outlines the previous work of the ATLAS Events Group in developing a “network approach to events,” as well as conceptualizing the differences between event networks and platforms.
MULTIFILE
The evolution of emerging technologies that use Radio Frequency Electromagnetic Field (RF-EMF) has increased the interest of the scientific community and society regarding the possible adverse effects on human health and the environment. This article provides NextGEM’s vision to assure safety for EU citizens when employing existing and future EMF-based telecommunication technologies. This is accomplished by generating relevant knowledge that ascertains appropriate prevention and control/actuation actions regarding RF-EMF exposure in residential, public, and occupational settings. Fulfilling this vision, NextGEM commits to the need for a healthy living and working environment under safe RF-EMF exposure conditions that can be trusted by people and be in line with the regulations and laws developed by public authorities. NextGEM provides a framework for generating health-relevant scientific knowledge and data on new scenarios of exposure to RF-EMF in multiple frequency bands and developing and validating tools for evidence-based risk assessment. Finally, NextGEM’s Innovation and Knowledge Hub (NIKH) will offer a standardized way for European regulatory authorities and the scientific community to store and assess project outcomes and provide access to findable, accessible, interoperable, and reusable (FAIR) data.
DOCUMENT
Thermal comfort is determined by the combined effect of the six thermal comfort parameters: temperature, air moisture content, thermal radiation, air relative velocity, personal activity and clothing level as formulated by Fanger through his double heat balance equations. In conventional air conditioning systems, air temperature is the parameter that is normally controlled whilst others are assumed to have values within the specified ranges at the design stage. In Fanger’s double heat balance equation, thermal radiation factor appears as the mean radiant temperature (MRT), however, its impact on thermal comfort is often ignored. This paper discusses the impacts of the thermal radiation field which takes the forms of mean radiant temperature and radiation asymmetry on thermal comfort, building energy consumption and air-conditioning control. Several conditions and applications in which the effects of mean radiant temperature and radiation asymmetry cannot be ignored are discussed. Several misinterpretations that arise from the formula relating mean radiant temperature and the operative temperature are highlighted, coupled with a discussion on the lack of reliable and affordable devices that measure this parameter. The usefulness of the concept of the operative temperature as a measure of combined effect of mean radiant and air temperatures on occupant’s thermal comfort is critically questioned, especially in relation to the control strategy based on this derived parameter. Examples of systems which deliver comfort using thermal radiation are presented. Finally, the paper presents various options that need to be considered in the efforts to mitigate the impacts of the thermal radiant field on the occupants’ thermal comfort and building energy consumption.
DOCUMENT
One of the claims the OER movement makes is that availability of (open) digital learning materials improves the quality of education. The promise is the ability to offer educational programs that take into account specific demands of the learner. The question is how to reach a situation where a customized demand can be met using OER with acceptable quality against acceptable costs. This situation resembles mass customization as is common in industry for several decades now. Techniques from an industry where an end product is assembled with the demands of the customer as a starting point can be translated to the field of education where courses and learning paths through a curriculum are assembled using a mixture of open and closed learning materials and learning services offered by an institution. Advanced IT support for both the modeling of the learning materials and services and a configurator to be used by a learner are necessary conditions for this approach.
MULTIFILE
Adversarial thinking is essential when dealing with cyber incidents and for finding security vulnerabilities. Capture the Flag (CTF) competitions are used all around the world to stimulate adversarial thinking. Jeopardy-style CTFs, given their challenge-and-answer based nature, are used more and more in cybersecurity education as a fun and engaging way to inspire students. Just like traditional written exams, Jeopardy-style CTFs can be used as summative assessment. Did a student provide the correct answer, yes or no. Did the participant in the CTF competition solve the challenge, yes or no. This research project provides a framework for measuring the learning outcomes of a Jeopardy-style CTF and applies this framework to two CTF events as case studies. During these case studies, participants were tested on their knowledge and skills in the field of cybersecurity and queried on their attitude towards CTF education. Results show that the main difference between traditional written exam and a Jeopardy-style CTF is the way in which questions a re formulated. CTF education is stated to be challenging and fun because questions are formulated as puzzles that need to be solved in a gamified and competitive environment. Just like traditional written exams, no additional insight into why the participant thinks the correct answer is the correct answer has been observed or if the participant really did learn anything new by participating. Given that the main difference between a traditional written exam and a Jeopardy-style CTF is the way in which questions are formulated, learning outcomes can be measured in the same way. We can ask ourselves how many participants solved which challenge and to which measurable statements about “knowledge, skill and attitude” in the field of cybersecurity each challenge is related. However, when mapping the descriptions of the quiz-questions and challenges from the two CTF events as case studies to the NICE framework on Knowledge, Skills and Abilities in cybersecurity, the NICE framework did not provide us with detailed measurable statements that could be used in education. Where the descriptions of the quiz-questions and challenges were specific, the learning outcomes of the NICE framework are only formulated in a quite general matter. Finally, some evidence for Csíkszentmihályi’s theory of Flow has been observed. Following the theory of Flow, a person can become fully immersed in performing a task, also known as “being in the zone” if the “challenge level” of the task is in line with the person’s “skill level”. The persons mental state towards a task will be different depending on the challenge level of the task and required skill level for completing it. Results show that participants state that some challenges were difficult and fun, where other challenges were easy and boring. As a result of this9 project, a guide / checklist is provided for those intending to use CTF in education.
DOCUMENT
In order to find out whether victims adequately recover from cybercrime incidents, it is important to gain insight into its effects and impact on users. However, as it stands now, there is not much literature on the impact of cybercrime. We address this gap by qualitatively examining the impact of two types of cybercrime, namely phishing and malware attacks targeting online banking customers. We used the coping approach as a framework to study how victims deal with the negative events they have experienced. In order to study the impact of cybercrime and how victims cope with it, 30 cybercrime victims were interviewed. We observed that, next to financial damage, victims described different forms of psychological and emotional effects. Victims also reported various kinds of secondary impacts, such as time loss and not being treated properly when handling the incident. In addition, the interview data provided insight into cognitive and behavioral change, which potentially offers opportunities for cybercrime prevention. Our study demonstrates that the level of impact varies among cybercrime victims, ranging from little or no impact to severe impact. In addition, while some victims were only affected for a few days, some were still feeling the effects. The effects and impact of these fraudulent schemes on victims should therefore not be underestimated. We conclude that the coping approach provides a useful framework to study the effects and impact of cybercrime victimization and how victims recover from it. The results of our study provide a steppingstone for future studies on this topic. https://www.linkedin.com/in/rutgerleukfeldt/
DOCUMENT
The main question in this PhD thesis is: How can Business Rules Management be configured and valued in organizations? A BRM problem space framework is proposed, existing of service systems, as a solution to the BRM problems. In total 94 vendor documents and approximately 32 hours of semi-structured interviews were analyzed. This analysis revealed nine individual service systems, in casu elicitation, design, verification, validation, deployment, execution, monitor, audit, and version. In the second part of this dissertation, BRM is positioned in relation to BPM (Business Process Management) by means of a literature study. An extension study was conducted: a qualitative study on a list of business rules formulated by a consulting organization based on the Committee of Sponsoring Organizations of the Treadway Commission risk framework. (from the summary of the Thesis p. 165)
DOCUMENT
Liveblogs are very popular with the public and journalists alike. The problem, though, is their credibility, given the uncertainty of the covered events and the immediacy of their production. Little is known about how journalists routinize the unexpected—to paraphrase Tuchman—when journalists report about an event that is still unfolding. This paper is about makers of liveblogs, livebloggers, so to speak, and the routines and conventions they follow. To better understand the relationship between those who do the “liveblogging” and how the “liveblogging” is done, we interviewed a selection of nine experienced livebloggers who cover breaking news, sports, and politics for the three most-visited news platforms in the Netherlands. Based on our results, we concluded that journalists working at different platforms follow similar routines and conventions for claiming, acquiring, and justifying knowledge. Journalists covering news in liveblogs must have expert knowledge, as well as technical and organizational skills. Liveblogging—in contrast to regular, online reporting—is best summarized as a social process instead of an autonomous production. These findings are important for three reasons: first, to understand how journalists cope with uncertainty covering events under immediate circumstances using liveblogs; second, to understand the workings of this popular format; and third, to contribute to literature about journalistic genres, discourse communities and, more specifically, generic requirements of liveblogs for effects of credibility to take place.
MULTIFILE
The value of a decision can be increased through analyzing the decision logic, and the outcomes. The more often a decision is taken, the more data becomes available about the results. More available data results into smarter decisions and increases the value the decision has for an organization. The research field addressing this problem is Decision mining. By conducting a literature study on the current state of Decision mining, we aim to discover the research gaps and where Decision mining can be improved upon. Our findings show that the concepts used in the Decision mining field and related fields are ambiguous and show overlap. Future research directions are discovered to increase the quality and maturity of Decision mining research. This could be achieved by focusing more on Decision mining research, a change is needed from a business process Decision mining approach to a decision focused approach.
DOCUMENT
This overview can be regarded as an atlas or travel guide with which the reader can follow a route along the various professorships. Chapter 2 centres on the professorships that are active in the field of Service Economy. Chapter 3 is dedicated to the professorships that are focussed on the field of Vital Region. Chapter 4 describes the professorships operating in the field of Smart Sustainable Industries. Chapter 5 deals with the professorships that are active in the field of the institution-wide themes of Design Based Education and Design Based Research. Lastly, in Chapter 6 we make an attempt to discover one or more connecting themes or procedures in the approach of the various professorships. This publication is not intended to give a definitive answer to the question as to what exactly NHL Stenden means by the concept of Design Based Research. The aim of this publication is to get an idea of everything that is happening in the NHL Stenden professorships and to pique one’s curiosity to find out more.
DOCUMENT