In this project we take a look at the laws and regulations surrounding data collection using sensors in assistive technology and the literature on concerns of people about this technology. We also look into the Smart Teddy device and how it operates. An analysis required by the General Data Protection Regulation (GDPR) [5] will reveal the risks in terms of privacy and security in this project and how to mitigate them. https://nl.linkedin.com/in/haniers
MULTIFILE
Information and communications technologies (ICTs) in human services are on the rise and raise concerns about their place and impact on the daily activities of professionals and clients. This article describes a study in which a social mobile application was developed for job coaches and employees and implemented in a pilot phase. The aim of the mobile application was to provide a better communication between employees and their job coaches and to provide more up-to-date information about the organization. The application consisted of a personal web environment and app with vacancies, personal news, events, tips, and promotions. A qualitative methodology was used in the form of focus groups and in-depth interviews. The results of this study show that the participants are partly positive about the social mobile application. It can be concluded that the use of mobile technologies can be beneficial in a range of human services practice settings for both professionals and clients and, therefore, requires more attention from the academic field to focus on this relatively new but promising theme.
Firms increasingly use social network sites to reach out to customers and proactively intervene with observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service, sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to theorize how proactive customer service interventions with consumer messages on social network sites may evoke feelings of privacy infringement. Subsequently we use privacy calculus theory to propose how these perceptions of privacy infringement, together with the perceived usefulness of the intervention, in turn drive customer satisfaction. In two experiments, we find that feelings of privacy infringement associated with proactive interventions may explain why only reactive interventions enhance customer satisfaction. Moreover, we find that customer satisfaction can be modeled through the calculus of the perceived usefulness and feelings of privacy infringement associated with an intervention. These findings contribute to a better understanding of the impact of privacy concerns on consumer behavior in the context of firm–consumer interactions on social network sites, extend the applicability of privacy calculus theory, and contribute to complaint and compliment management literature. To practitioners, our findings demonstrate that feelings of privacy are an element to consider when handling consumer messages on social media, but also that privacy concerns may be overcome if an intervention is perceived as useful enough.
MULTIFILE
The maximum capacity of the road infrastructure is being reached due to the number of vehicles that are being introduced on Dutch roads each day. One of the plausible solutions to tackle congestion could be efficient and effective use of road infrastructure using modern technologies such as cooperative mobility. Cooperative mobility relies majorly on big data that is generated potentially by millions of vehicles that are travelling on the road. But how can this data be generated? Modern vehicles already contain a host of sensors that are required for its operation. This data is typically circulated within an automobile via the CAN bus and can in-principle be shared with the outside world considering the privacy aspects of data sharing. The main problem is, however, the difficulty in interpreting this data. This is mainly because the configuration of this data varies between manufacturers and vehicle models and have not been standardized by the manufacturers. Signals from the CAN bus could be manually reverse engineered, but this process is extremely labour-intensive and time-consuming. In this project we investigate if an intelligent tool or specific test procedures could be developed to extract CAN messages and their composition efficiently irrespective of vehicle brand and type. This would lay the foundations that are required to generate big data-sets from in-vehicle data efficiently.
De overheid neemt steeds meer maatregelen in het kader van de veiligheid die tot gevolg hebben dat de privacy van burgers wordt ingeperkt. In hoeverre is de staat gelegitimeerd om dergelijke privacyinperkende maatregelen te nemen?Doel Het doel is om tot een afwegingsmodel te komen waarbij enerzijds wordt gekeken naar de waarde van privacy ten aanzien van de inperking en anderzijds wordt gekeken naar de verschillende factoren van veiligheid (Powell). Het model van Powell ten aanzien van de verschillende factoren van veiligheid is aangepast aan de context van het onderzoek. Daarnaast wordt de theorie van Dworkin ‘Rights as trumps’ gebruikt om tot een juiste afweging te komen. Resultaten Lees het artikel: The Value of Privacy and Surveillance Drones in the Public Domain: Scrutinizing the Dutch Flexible Deployment of Mobile Cameras Act in het Journal of Politics and Law Archives Vol. 10, No. 5 (2017) door Gerdo Kuiper en Quirine Eijkman. Looptijd 01 september 2012 - 01 augustus 2020 Aanpak De verschillende dimensies en waarde van privacy worden bekeken vanuit de geschiedenis van privacy in een Nederlandse en Amerikaanse context. Aan de hand van een historische- en een analytische beschouwing van het concept veiligheid wordt het model van Powell ten aanzien van de factoren veiligheid aangepast aan de context van dit onderzoek.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.