While consumers have become increasingly aware of the need for sustainability in fashion, many do not translate their intention to purchase sustainable fashion into actual behavior. Insights can be gained from those who have successfully transitioned from intention to behavior (i.e., experienced sustainable fashion consumers). Despite a substantial body of literature exploring predictors of sustainable fashion purchasing, a comprehensive view on how predictors of sustainable fashion purchasing vary between consumers with and without sustainable fashion experience is lacking. This paper reports a systematic literature review, analyzing 100 empirical articles on predictors of sustainable fashion purchasing among consumer samples with and without purchasing experience, identified from the Web of Science and Scopus databases.
MULTIFILE
In this paper we focus on the inclusion of decentralized energy production in the current energy infrastructure, and the changing role of the consumer towards a producer and an active participant in the energy value network.
The application of DC grids is gaining more attention in office applications. Especially since powering an office desk would not require a high power connection to the main AC grid but could be made sustainable using solar power and battery storage. This would result in fewer converters and further advanced grid utilization. In this paper, a sustainable desk power application is described that can be used for powering typical office appliances such as computers, lighting, and telephones. The desk will be powered by a solar panel and has a battery for energy storage. The applied DC grid includes droop control for power management and can either operate stand-alone or connected to other DC-desks to create a meshed-grid system. A dynamic DC nano-grid is made using multiple self-developed half-bridge circuit boards controlled by microcontrollers. This grid is monitored and controlled using a lightweight network protocol, allowing for online integration. Droop control is used to create dynamic power management, allowing automated control for power consumption and production. Digital control is used to regulate the power flow, and drive other applications, including batteries and solar panels. The practical demonstrative setup is a small-sized desktop with applications built into it, such as a lamp, wireless charging pad, and laptop charge point for devices up to 45W. User control is added in the form of an interactive remote wireless touch panel and power consumption is monitored and stored in the cloud. The paper includes a description of technical implementation as well as power consumption measurements.
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.