The phenomena of urbanization and climate change interact with the growing number of older people living in cities. One of the effects of climate change is an increased riverine flooding hazard, and when floods occur this has a severe impact on human lives and comes with vast economic losses. Flood resilience management procedures should be supported by a combination of complex social and environmental vulnerability assessments. Therefore, new methodologies and tools should be developed for this purpose. One way to achieve such inclusive procedures is by incorporating a social vulnerability evaluation methodology for environmental and flood resilience assessment. These are illustrated for application in the Polish city of Wrocław. Socio-environmental vulnerability mapping, based on spatial analyses using the poverty risk index, data on the ageing population, as well as the distribution of the areas vulnerable to floods, was conducted with use of a location intelligence system combining Geographic Information System (GIS) and Business Intelligence (BI) tools. The new methodology allows for the identification of areas populated by social groups that are particularly vulnerable to the negative effects of flooding. C 2018 SETAC Original Publication: Integr Environ Assess Manag 2018;14:592–597. DOI: https://doi.org/10.1002/ieam.4077
MULTIFILE
Since the first uptake of electric vehicles, policy makers are questioning how to rollout public charging infrastructure in an efficient manner, such that user convenience balances with costs of investment. In some metropolitan areas, the first phase of rollout has been passed, meaning an optimized deployment of future charging stations for electric vehicles (EVs) becomes important to improve the charging infrastructure and ensure customer satisfaction and sufficient service provision. Complex system literature shows that network vulnerability is an important metric, yet, charging infrastructure has not yet been a subject of these simulation models so far. This research, based on real-world data, provides a novel approach for improving the roll-out strategy of municipalities, by treating the charge infrastructure as a complex network of charging stations and defining vulnerability in respect to the availability of its surrounding charging stations within relevant walking distance.
DOCUMENT
The study of human factors in forensic science informs our understanding of the interaction between humans and the systems they use. The Expert Working Group (EWG) on Human Factors in Forensic DNA Interpretation used a systems approach to conduct a scientific assessment of the effects of human factors on forensic DNA interpretation with the goal of recommending approaches to improve practice and reduce the likelihood and consequence of errors. This effort resulted in 44 recommendations. The EWG designed many of these recommendations to improve the production, interpretation, evaluation, documentation, and communication of DNA comparison results.
MULTIFILE
In leaving the more traditional territories of the concert performance for broader societal contexts, professional musicians increasingly devise music in closer collaboration with their audience rather than present it on a stage. Although the interest for such forms of devising co-creative musicking within the (elderly) health care sector is growing, the work can be considered relatively new. In terms of research, multiple studies have sought to understand the impact of such work on musicians and participants, however little is known about what underpins the musicians’ actions in these settings. With this study, I sought to address this gap by investigating professional musicians’ emerging practices when devising co-creative musicking with elderly people. Three broad concepts were used as a theoretical background to the study: Theory of Practice, co-creative musicking, and Praxialism. Firstly, I used Theory of Practice to help understand the nature of emerging practices in a wider context of change in the field of music and habitus of musicians and participants. Theory of Practice enabled me to consider a practice as “a routinized type of behaviour which consists of several elements, interconnected to one another: forms of bodily activities, forms of mental activities, ‘things’ and their use, a background knowledge in the form of understanding, know-how, states of emotion, and motivational knowledge” (Reckwitz, 2002, p. 249). Secondly, I drew the knowledge from co-creative musicking, which is a concept I gathered from two existing concepts: co-creation and musicking. Musicking (Small, 1998), which considers music as something we do (including any mode of engagement with music), provided a holistic and inclusive way of looking at participation in music-making. The co-creation paradigm encompasses a view on enterprise that consists of bringing together parties to jointly create an outcome that is meaningful to all (Prahalad & Ramaswamy, 2004; Ramaswamy & Ozcan, 2014). The concept served as a lens to specify the jointness of the musicking and challenge issues of power in the engagement of participants in the creative-productive process. Thirdly, Praxialism considers musicking as an activity that encompasses “musical doers, musical doing, something done and contexts in which the former take place” (Elliott, 1995). Praxialism sets out a vision on music that goes beyond the musical work and includes the meanings and values of those involved (Silverman, Davis & Elliott, 2014). The concept allowed me to examine the work and emerging relationships as a result of devising co-creative musicking from an ethical perspective. Given the subject’s relative newness and rather unexplored status, I examined existing work empirically through an ethnographic approach (Hammersley & Atkinson, 2007). Four cases were selected where data was gathered through episodic interviewing (Flick, 2009) and participant observation. Elements of a constructivist Grounded Theory (Charmaz, 2014) were used for performing an abductive analysis. The analysis included initial coding, focused coding, the use of sensitizing concepts (Blumer 1969 in Hammersley, 2013) and memoing. I wrote a thick description (Geertz, 1973) for each case portraying the work from my personal experience. The descriptions are included in the dissertation as one separate chapter and foreshadow the exposition of the analysis in a next chapter. In-depth study of the creative-productive processes of the cases showed the involvement of multiple co-creative elements, such as a dialogical interaction between musicians and audience. However, participants’ contributions were often adopted implicitly, through the musicians interpreting behaviour and situations. This created a particular power dynamic and challenges as to what extent the negotiation can be considered co-creative. The implicitness of ‘making use’ of another person’s behaviour with the other not (always) being aware of this also triggered an ethical perspective, especially because some of the cases involved participants that were vulnerable. The imbalance in power made me examine the relationship that emerges between musicians and participants. As a result of a closer contact in the co-creative negotiation, I witnessed a contact of a highly personal, sometimes intimate, nature. I recognized elements of two types of connections. One type could be called ‘humanistic’, as a friendship in which there is reciprocal care and interest for the other. The other could be seen as ‘functional’, which means that the relationship is used as a resource for providing input for the creative musicking process. From this angle, I have compared the relationship with that of a relationship of an artist with a muse. After having examined the co-creative and relational sides of the interaction in the four cases, I tuned in to the musicians’ contribution to these processes and relationships. I discovered that their devising in practice consisted of a continuous double balancing act on two axes: one axis considers the other and oneself as its two ends. Another axis concerns the preparedness and unpredictability at its ends. Situated at the intersection of the two axes are the musicians’ intentionality, which is fed by their intentions, values and ethics. The implicitness of the co-creation, the two-sided relationship, the potential vulnerability of participants, and the musicians’ freedom in navigating and negotiation, together, make the devising of co-creative musicking with elderly people an activity that involves ethical challenges that are centred around a tension between prioritizing doing good for the other, associated with a eudaimonic intention, and prioritizing values of the musical art form, resembling a musicianist intention. The results therefore call for a musicianship that involves acting reflectively from an ethical perspective. Doctoral study by Karolien Dons
Despite the benefits of the widespread deployment of diverse Internet-enabled devices such as IP cameras and smart home appliances - the so-called Internet of Things (IoT) has amplified the attack surface that is being leveraged by cyber criminals. While manufacturers and vendors keep deploying new products, infected devices can be counted in the millions and spreading at an alarming rate all over consumer and business networks. The objective of this project is twofold: (i) to explain the causes behind these infections and the inherent insecurity of the IoT paradigm by exploring innovative data analytics as applied to raw cyber security data; and (ii) to promote effective remediation mechanisms that mitigate the threat of the currently vulnerable and infected IoT devices. By performing large-scale passive and active measurements, this project will allow the characterization and attribution of compromise IoT devices. Understanding the type of devices that are getting compromised and the reasons behind the attacker’s intention is essential to design effective countermeasures. This project will build on the state of the art in information theoretic data mining (e.g., using the minimum description length and maximum entropy principles), statistical pattern mining, and interactive data exploration and analytics to create a casual model that allows explaining the attacker’s tactics and techniques. The project will research formal correlation methods rooted in stochastic data assemblies between IoT-relevant measurements and IoT malware binaries as captured by an IoT-specific honeypot to aid in the attribution and thus the remediation objective. Research outcomes of this project will benefit society in addressing important IoT security problems before manufacturers saturate the market with ostensibly useful and innovative gadgets that lack sufficient security features, thus being vulnerable to attacks and malware infestations, which can turn them into rogue agents. However, the insights gained will not be limited to the attacker behavior and attribution, but also to the remediation of the infected devices. Based on a casual model and output of the correlation analyses, this project will follow an innovative approach to understand the remediation impact of malware notifications by conducting a longitudinal quasi-experimental analysis. The quasi-experimental analyses will examine remediation rates of infected/vulnerable IoT devices in order to make better inferences about the impact of the characteristics of the notification and infected user’s reaction. The research will provide new perspectives, information, insights, and approaches to vulnerability and malware notifications that differ from the previous reliance on models calibrated with cross-sectional analysis. This project will enable more robust use of longitudinal estimates based on documented remediation change. Project results and methods will enhance the capacity of Internet intermediaries (e.g., ISPs and hosting providers) to better handle abuse/vulnerability reporting which in turn will serve as a preemptive countermeasure. The data and methods will allow to investigate the behavior of infected individuals and firms at a microscopic scale and reveal the causal relations among infections, human factor and remediation.