The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The purpose of this study is to establish a model for measuring secure behaviour, and to use this model to measure the secure behaviour of individuals while using mobile digital devices such as smartphones and laptops.
DOCUMENT
Abstract: Electronic and electrical waste (e-waste) is growing fast. The purpose of this study is to examine young consumers’ purchase intention of refurbished electronic devices (REDs) such as laptop, tablet, mobile phone and game console. From literature review the factors that influence young consumers’ purchase intention were identified as ‘environmental awareness’, ‘social acceptance’, ‘seller/brand reputation and availability’, and ‘affordability and value’. For each factor a few statements were developed and used as independent variables in a questionnaire. One statement was added about purchase intention as dependent variable. A Pearson correlation coefficient test us showed a clear positive correlation of ‘environmental awareness’ and ‘affordability and value’ with the intention to purchase REDs, but not for the other two factors. This analysis contributes to knowledge on young consumers’ perceptions of refurbished electronic devices and can inform the design of innovative value propositions and new business models for REDs that contribute to a circular economy
MULTIFILE
Can you remember the last time the ground gave way beneath you? When you thought the ground was stable, but for some reason it wasn’t? Perhaps you encountered a pothole on the streets of Amsterdam, or you were renovating your house and broke through the floor. Perhaps there was a molehill in a park or garden. You probably had to hold on to something to steady yourself. Perhaps you even slipped or fell. While I sincerely hope that nobody here was hurt in the process, I would like you to keep that feeling in your mind when reading what follows. It is the central theme of the words that will follow. The ground beneath our feet today is not as stable as the streets of Amsterdam, your park around the corner or even a poorly renovated upstairs bedroom. This is because whatever devices we use and whatever pathways we choose, we all live in hybrid physical and digital social spaces (Kitchin and Dodge 2011). Digital social spaces can be social media platforms like Twitter or Facebook, but also chat apps like WhatsApp or Signal. Crucially, social spaces are increasingly hybrid, in which conversations take place across digital spaces (WhatsApp chat group) and physical spaces (meeting friends in a cafe) simultaneously. The ground beneath our feet is not made of concrete or stone or wood but of bits and bytes.
DOCUMENT
Technological developments go fast and are interrelated and multi-interpretable. As consumer needs change, the technological possibilities to meet those needs are constantly evolving and new technology providers introduce new disruptive business models. This makes it difficult to predict what the world of tomorrow will look like for an organization and that makes the risks for organizations substantial. In this context, it is difficult for organizations to determine what constitutes a good strategy to adopt digital developments. This paper describes a first step of a study with the objective to design a method for organizations to formulate a future-proof strategy in a rapidly changing, complex and ambiguous context. More specifically, this paper describes the results of a sequence of three focus groups that were held with a group of eight experts, with extensive experience as members of the decision making unit in organizations. The objectives of these sessions were to determine possible solutions for the outlined challenge in order to provide direction for continuation and scoping of the following research phases.
MULTIFILE
Hoe kan Digital Twin-technologie de Nederlandse maakindustrie helpen om efficiënt energiezuinig en circulair te werken? Met praktijkgericht onderzoek helpt het lectoraat Industriële Digital Twins van de Hogeschool van Amsterdam (HvA) bedrijven om CO2-neutraal te worden en daarmee internaal competitief te blijven.
DOCUMENT
Embedded connected computers are installed in homes in increasing numbers in the form of consumer IoT devices. These devices are often insufficiently protected against cyberattacks. In this research report, we propose several security requirements for consumer IoT devices. These requirements are suitable for enforcement through legislation and will significantly improve consumer IoT cybersecurity when implemented.This research report, commissioned by the Dutch Radiocommunications Agency, describes a threat model and significant security problems, derived from literature research. These assisted in evaluating more than 400 security measures, after which the top measures were summarised into eight essential security requirements. These requirements are easy to implement, easy to test, unambiguous, and greatly improve the cybersecurity of the products. We recommend standardisation agencies to make these requirements mandatory for all consumer IoT devices.
MULTIFILE
Websites placing cookies on your computer to track your browsing behavior. TikTok stores your personal data in China. Are you aware of what products, services, and organisations do with your personal data? It is often not obvious. Our digital lives are becoming more and more prominent. We are now meeting each other virtually for work and leisure, and are spotted and traced without our knowledge, both in physical places (public areas and streets) and in virtual spaces. Technology is developing rapidly and policy makers are not able to keep up, resulting in unknown threats for citizens in modern society. Moreover, technology can lead to inequality and exclusion, as demonstrated in the Dutch childcare benefits scandal. The aim of the Inholland Digital Rights Research Team, co-founded by Professors Wina Smeenk, Ander de Keijzer and Ben Wagner, is to focus their work on the social, economic, cultural, communication, design and technological elements that can lead to a digitally responsible society. This means that we want to be part of the debate and research on how technology in our digital age can contribute to the quality of peoples’ lives: how can people benefit from the digital society and how are they hindered, or even worse, excluded from partaking in our digital society. We do this in our research lines, as well as in the sustainable media lab courses and the data-driven minor.
DOCUMENT
Parents who grew up without digital monitoring have a plethora of parental monitoring opportunities at their disposal. While they can engage in surveillance practices to safeguard their children, they also have to balance freedom against control. This research is based on in-depth interviews with eleven early adolescents and eleven parents to investigate everyday negotiations of parental monitoring. Parental monitoring is presented as a form of lateral surveillance because it entails parents engaging in surveillance practices to monitor their children. The results indicate that some parents are motivated to use digital monitoring tools to safeguard and guide their children, while others refrain from surveillance practices to prioritise freedom and trust. The most common forms of surveillance are location tracking and the monitoring of digital behaviour and screen time. Moreover, we provide unique insights into the use of student tracking systems as an impactful form of control. Early adolescents negotiate these parental monitoring practices, with responses ranging from acceptance to active forms of resistance. Some children also monitor their parents, showcasing a reciprocal form of lateral surveillance. In all families, monitoring practices are negotiated in open conversations that also foster digital resilience. This study shows that the concepts of parental monitoring and lateral surveillance fall short in grasping the reciprocal character of monitoring and the power dynamics in parent-child relations. We therefore propose that monitoring practices in families can best be understood as family surveillance, providing a novel concept to understand how surveillance is embedded in contemporary media practices among interconnected family members.
MULTIFILE
Background: Digital health is well-positioned in low and middle-income countries (LMICs) to revolutionize health care due, in part, to increasing mobile phone access and internet connectivity. This paper evaluates the underlying factors that can potentially facilitate or hinder the progress of digital health in Pakistan. Objective: The objective of this study is to identify the current digital health projects and studies being carried out in Pakistan, as well as the key stakeholders involved in these initiatives. We aim to follow a mixed-methods strategy and to evaluate these projects and studies through a strengths, weaknesses, opportunities, and threats (SWOT) analysis to identify the internal and external factors that can potentially facilitate or hinder the progress of digital health in Pakistan. Methods: This study aims to evaluate digital health projects carried out in the last 5 years in Pakistan with mixed methods. The qualitative and quantitative data obtained from field surveys were categorized according to the World Health Organization’s (WHO) recommended building blocks for health systems research, and the data were analyzed using a SWOT analysis strategy. Results: Of the digital health projects carried out in the last 5 years in Pakistan, 51 are studied. Of these projects, 46% (23/51) used technology for conducting research, 30% (15/51) used technology for implementation, and 12% (6/51) used technology for app development. The health domains targeted were general health (23/51, 46%), immunization (13/51, 26%), and diagnostics (5/51, 10%). Smartphones and devices were used in 55% (28/51) of the interventions, and 59% (30/51) of projects included plans for scaling up. Artificial intelligence (AI) or machine learning (ML) was used in 31% (16/51) of projects, and 74% (38/51) of interventions were being evaluated. The barriers faced by developers during the implementation phase included the populations’ inability to use the technology or mobile phones in 21% (11/51) of projects, costs in 16% (8/51) of projects, and privacy concerns in 12% (6/51) of projects.
DOCUMENT
Nowadays, digital tools for mathematics education are sophisticated and widely available. These tools offer important opportunities, but also come with constraints. Some tools are hard to tailor by teachers, educational designers and researchers; their functionality has to be taken for granted. Other tools offer many possible educational applications, which require didactical choices. In both cases, one may experience a tension between a teacher’s didactical goals and the tool’s affordances. From the perspective of Realistic Mathematics Education (RME), this challenge concerns both guided reinvention and didactical phenomenology. In this chapter, this dialectic relationship will be addressed through the description of two particular cases of using digital tools in Dutch mathematics education: the introduction of the graphing calculator (GC), and the evolution of the online Digital Mathematics Environment (DME). From these two case descriptions, my conclusion is that students need to develop new techniques for using digital tools; techniques that interact with conceptual understanding. For teachers, it is important to be able to tailor the digital tool to their didactical intentions. From the perspective of RME, I conclude that its match with using digital technology is not self-evident. Guided reinvention may be challenged by the rigid character of the tools, and the phenomena that form the point of departure of the learning of mathematics may change in a technology-rich classroom.
LINK