Virtual or online content creation is no longer an external process done by software developers or professional new media players, but is more and more performed by ordinary people. In this paper, we focus on non-professional users to present how different categories of users get involved in the process of content sharing and creation within a city community. That only a few of them are interested in contributing to this community is nothing new in itself. Instead, we want to look at what is needed to encourage them to help us build up a virtual ‘replica’ of the city using an ad hoc application, i.e., the A4MC-application. To support them in achieving this goal, this mobile city device must have some iterative elements (like tags, ratings, comments, etc., which are also known as social features) that stimulate users to become active members of that particular community. By exploring which of these interactive elements are most suitable on mobile devices, we hope to define a framework to support users in generating content in a user-friendly way.
Abstract Background: With the growing shortage of nurses, labor-saving technology has become more important. In health care practice, however, the fit with innovations is not easy. The aim of this study is to analyze the development of a mobile input device for electronic medical records (MEMR), a potentially labor-saving application supported by nurses, that failed to meet the needs of nurses after development. Method: In a case study, we used an axiomatic design framework as an evaluation tool to visualize the mismatches between customer needs and the design parameters of the MEMR, and trace these mismatches back to (preliminary) decisions in the development process. We applied a mixed-method research design that consisted of analyzing of 118 external and internal files and working documents, 29 interviews and shorter inquiries, a user test, and an observation of use. By factoring and grouping the findings, we analyzed the relevant categories of mismatches. Results: The involvement of nurses during the development was extensive, but not all feedback was, or could not be, used effectively to improve the MEMR. The mismatches with the most impact were found to be: (1) suboptimal supportive technology, (2) limited functionality of the app and input device, and (3) disruption of nurses’ workflow. Most mismatches were known by the IT department when the MEMR was offered to the units as a product. Development of the MEMR came to a halt because of limited use. Conclusion: Choices for design parameters, made during the development of labor-saving technology for nurses, may conflict with the customer needs of nurses. Even though the causes of mismatches were mentioned by the IT department, the nurse managers acquired the MEMR based on the idea behind the app. The effects of the chosen design parameters should not only be compared to the customer needs, but also be assessed with nurses and nurse managers for the expected effect on the workflow.
LINK
Embedded connected computers are installed in homes in increasing numbers in the form of consumer IoT devices. These devices are often insufficiently protected against cyberattacks. In this research report, we propose several security requirements for consumer IoT devices. These requirements are suitable for enforcement through legislation and will significantly improve consumer IoT cybersecurity when implemented.This research report, commissioned by the Dutch Radiocommunications Agency, describes a threat model and significant security problems, derived from literature research. These assisted in evaluating more than 400 security measures, after which the top measures were summarised into eight essential security requirements. These requirements are easy to implement, easy to test, unambiguous, and greatly improve the cybersecurity of the products. We recommend standardisation agencies to make these requirements mandatory for all consumer IoT devices.
MULTIFILE
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.
A world where technology is ubiquitous and embedded in our daily lives is becoming increasingly likely. To prepare our students to live and work in such a future, we propose to turn Saxion’s Epy-Drost building into a living lab environment. This will entail setting up and drafting the proper infrastructure and agreements to collect people’s location and building data (e.g. temperature, humidity) in Epy-Drost, and making the data appropriately available to student and research projects within Saxion. With regards to this project’s effect on education, we envision the proposal of several derived student projects which will provide students the opportunity to work with huge amounts of data and state-of-the-art natural interaction interfaces. Through these projects, students will acquire skills and knowledge that are necessary in the current and future labor-market, as well as get experience in working with topics of great importance now and in the near future. This is not only aligned with the Creative Media and Game Technologies (CMGT) study program’s new vision and focus on interactive technology, but also with many other education programs within Saxion. In terms of research, the candidate Postdoc will study if and how the data, together with the building’s infrastructure, can be leveraged to promote healthy behavior through playful strategies. In other words, whether we can persuade people in the building to be more physically active and engage more in social interactions through data-based gamification and building actuation. This fits very well with the Ambient Intelligence (AmI) research group’s agenda in Augmented Interaction, and CMGT’s User Experience line. Overall, this project will help spark and solidify lasting collaboration links between AmI and CMGT, give body to AmI’s new Augmented Interaction line, and increase Saxion’s level of education through the dissemination of knowledge between researchers, teachers and students.
The demand for mobile agents in industrial environments to perform various tasks is growing tremendously in recent years. However, changing environments, security considerations and robustness against failure are major persistent challenges autonomous agents have to face when operating alongside other mobile agents. Currently, such problems remain largely unsolved. Collaborative multi-platform Cyber- Physical-Systems (CPSs) in which different agents flexibly contribute with their relative equipment and capabilities forming a symbiotic network solving multiple objectives simultaneously are highly desirable. Our proposed SMART-AGENTS platform will enable flexibility and modularity providing multi-objective solutions, demonstrated in two industrial domains: logistics (cycle-counting in warehouses) and agriculture (pest and disease identification in greenhouses). Aerial vehicles are limited in their computational power due to weight limitations but offer large mobility to provide access to otherwise unreachable places and an “eagle eye” to inform about terrain, obstacles by taking pictures and videos. Specialized autonomous agents carrying optical sensors will enable disease classification and product recognition improving green- and warehouse productivity. Newly developed micro-electromechanical systems (MEMS) sensor arrays will create 3D flow-based images of surroundings even in dark and hazy conditions contributing to the multi-sensor system, including cameras, wireless signatures and magnetic field information shared among the symbiotic fleet. Integration of mobile systems, such as smart phones, which are not explicitly controlled, will provide valuable information about human as well as equipment movement in the environment by generating data from relative positioning sensors, such as wireless and magnetic signatures. Newly developed algorithms will enable robust autonomous navigation and control of the fleet in dynamic environments incorporating the multi-sensor data generated by the variety of mobile actors. The proposed SMART-AGENTS platform will use real-time 5G communication and edge computing providing new organizational structures to cope with scalability and integration of multiple devices/agents. It will enable a symbiosis of the complementary CPSs using a combination of equipment yielding efficiency and versatility of operation.