首页 > 最新文献

2015 IEEE International Symposium on Technology and Society (ISTAS)最新文献

英文 中文
Subcutaneous body area networks: A SWOT analysis 皮下身体区域网络:SWOT分析
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439414
P. Catherwood, D. Finlay, J. Mclaughlin
This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.
本文提出了一个SWOT分析的新兴和未来的非医疗人体植入设备领域。这一领域将开始成为未来个人计算的下一个重要主题之一,如果实现得当,将为社会带来巨大回报。该技术具有许多优势,适用于各种市场,包括娱乐,社交网络,人身安全,保安,消费,通信,医疗保健,便利和人体增强。这种皮下传感器技术将市民从众多的便携式计算设备、钥匙、钱包、通行证等中解放出来。然而,这项技术将成为黑客的目标,并可能导致更多的暴力抢劫和强制删除ID。此外,不利的健康影响、设备和电池的安全性和可靠性,以及与医疗处方植入物的共存,都是开发人员必须解决的问题,才能使这项技术取得成功。云计算、物联网和近场通信等外部新兴技术支持可植入系统的发展和潜在成功,并结合起来帮助解决人身安全、恐怖主义、人员跟踪和识别、电子支付和长期健康分析等问题。对这项技术采用的威胁包括社会对健康不良影响、非人化、侵犯人权、保守主义、社会隐私和宗教反对等方面的担忧。随着这项技术可能在未来5-10年内开始进入主流,需要付出相当大的努力来制定立法、政策、程序、设备和网络安全,并使公众相信这项技术是个人计算的下一个合乎逻辑的步骤。
{"title":"Subcutaneous body area networks: A SWOT analysis","authors":"P. Catherwood, D. Finlay, J. Mclaughlin","doi":"10.1109/ISTAS.2015.7439414","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439414","url":null,"abstract":"This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile cloud computing for disaster emergency operation: A systematic review 面向灾害应急操作的移动云计算:系统综述
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439422
T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu
The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.
移动云计算(MCC)的进步有可能改善灾害应急行动期间的通信和信息。来自不同国家的许多研究都讨论了在灾害操作期间实施移动云技术的不同方法。然而,从灾害紧急情况和技术的双重角度评价世纪挑战能力的综合循证研究一直缺乏。本文基于2010年至2015年发表的最新文献,对移动云计算作为关键系统或应用的研究进行了广泛的研究,并强调了在灾害应急操作中实施移动云计算的具体挑战。对计算机科学工程的4个主要期刊(IEEE、ACM、ProQuest、Inspec/Elsevier)进行了系统的文献综述,并将研究结果归类为灾害应急操作中MCC实施的四个关键挑战。我们根据该领域的主要挑战提出了一种分类法,并讨论了解决这些挑战的不同解决方案。最后,我们对尚未解决的挑战进行了批判性分析,并强调了未来工作的方向。
{"title":"Mobile cloud computing for disaster emergency operation: A systematic review","authors":"T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu","doi":"10.1109/ISTAS.2015.7439422","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439422","url":null,"abstract":"The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supply system's technology configuration as a contributor to end-user vulnerability 供电系统的技术配置是最终用户脆弱性的一个贡献者
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439445
L. Robertson, K. Michael, Albert Munoz Aneiros
Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.
需要维持其生活方式所必需的商品和服务的个人,越来越容易受到提供这些需求的复杂、相互联系和不同质的技术系统故障的影响。从最终用户的角度来看,现有的分析技术并没有充分量化这种技术系统造成的脆弱性。本研究探讨了非同质技术系统固有弱点的重要性,并提出了一种衡量脆弱性的方法,即每个服务的个人最终用户“暴露水平”。所开发的“暴露”度量是直接从技术系统的配置映射出来的。这种暴露措施可以对现有配置进行定量评估,并对技术系统提出改进建议。因此,该措施可用于确定哪些系统目前对每个人的影响最大,以确定这种影响的原因,并对缓解项目的有效性进行排名。
{"title":"Supply system's technology configuration as a contributor to end-user vulnerability","authors":"L. Robertson, K. Michael, Albert Munoz Aneiros","doi":"10.1109/ISTAS.2015.7439445","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439445","url":null,"abstract":"Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of \"exposure\" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"268 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya 信息通信技术支持肯尼亚莱基皮亚县小农获取保护性农业信息的推广服务
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439408
J. Achora, H. Sseguya
This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the "change agents" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf
本文探讨了信息通信技术(ict)在保护性农业(CA)知识途径中的应用。探讨了小农获取保护性农业信息的平行知识途径。本研究的目标是开发一种有效的传播模式,利用信息通信技术在现有途径中的使用,以改善保护农业的知识流动。设计、方法和方法:共有125名受访者接受了采访,其中有目的地选择了110名CA农民,使用半结构化问卷进行了采访。采用滚雪球法,对政策制定者和ICT服务提供商进行了15次关键信息提供者访谈。69%的受访者为女性,51%为男性。该研究的重点是在CA知识途径、传播途径、体制和社会经济因素中使用的不同信息通信技术。数据分析采用手工和ssspver。21. 初步研究结果表明,农民可以通过多种知识途径获取农业知识。报告确定了四种不同的ICT主导模式:政府主导的ICT模式、政府-非政府组织主导的ICT模式、政府-非政府组织-私营部门主导的ICT模式和非政府组织主导的ICT模式。然而,该研究指出,在利用现有信息通信技术模式、利用家庭一级的信息通信技术获取和所有权以及协调CA信息方面,各机构之间缺乏协调和薄弱联系。此外,尽管受访者拥有100%的手机、94%的收音机、64%的电视、10%的笔记本电脑和9%的电脑(台式)接入和所有权,但农民和大量推广人员缺乏充分利用这些工具获取农业知识的技能。启示:新兴的和现有的通信技术如果在创新的传播过程中被“变革推动者”所利用,将有很大的潜力来改善农业知识流动。被称为Web 2.0和“社交媒体”的新在线技术正慢慢成为协作、分享产品和市场信息的平台。村信息中心的开放链模式也提供了大量的经济机会,在提供公共/私人服务的同时也使社区联网。使用实时通信工具的机会受到了年轻农民的极大欢迎,这些新兴工具的优势在于它们的独特属性,类似于非洲社会系统中人们可以看到,举行讨论,获得即时反馈并使用书面媒体传达信息的传统口头交流文化。调查人口中信通技术拥有率和可及性较高,这也为充分利用信通技术改善农业知识途径和农业信息提供提供了潜力。
{"title":"ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya","authors":"J. Achora, H. Sseguya","doi":"10.1109/ISTAS.2015.7439408","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439408","url":null,"abstract":"This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the \"change agents\" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modelling Cyber Security Governance Maturity 网络安全治理成熟度建模
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439415
Rossouw de Bruin, S. V. Solms
The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a "Cyber Security Governance Maturity dashboard", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.
本文的目的是介绍一个模型-网络安全治理成熟度模型-旨在确定组织的一般网络安全成熟度。该模型由多个组成成熟度模型组成,旨在确定整体网络安全治理成熟度。该模型的最终结果是“网络安全治理成熟度仪表板”,它将提供每个组成成熟度模型所执行的成熟度评估的摘要。在这样做的过程中,组织的执行管理层可以对其网络安全治理成熟度进行总结和详细指示。
{"title":"Modelling Cyber Security Governance Maturity","authors":"Rossouw de Bruin, S. V. Solms","doi":"10.1109/ISTAS.2015.7439415","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439415","url":null,"abstract":"The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a \"Cyber Security Governance Maturity dashboard\", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Making the UCWW a reality 让UCWW成为现实
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439429
Ivan Ganchev, Zhanlin Ji, M. O'Droma
This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.
本文报告了一种新型基于云的下一代网络(NGN)系统原型的开发,该原型基于革命性的概念,以实现基于NGN的面向消费者的无线网络的下一阶段,建立在无处不在的消费者无线世界(UCWW)的关键属性之上。介绍了设计方面和潜在的社会影响。
{"title":"Making the UCWW a reality","authors":"Ivan Ganchev, Zhanlin Ji, M. O'Droma","doi":"10.1109/ISTAS.2015.7439429","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439429","url":null,"abstract":"This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iris recognition on consumer devices — Challenges and progress 消费类设备上的虹膜识别——挑战与进展
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439440
Shejin Thavalengal, P. Corcoran
This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.
本文概述了在智能手机或平板电脑等消费设备上实施和广泛采用虹膜识别技术所面临的各种技术、社会和道德挑战。使用当今的消费设备获取足够高质量的虹膜图像被认为是实现该技术的主要挑战。综述了这一领域的最新进展。一款智能手机外形的摄像头将被用作前置摄像头。该设备经过改进,可捕获近红外虹膜图像以及通用可见波长图像。分析表明,这种改进了光学和传感器的装置可用于下一代手持设备的虹膜识别。讨论了广泛采用该技术的社会影响。虹膜模式混淆是为了解决虹膜识别将成为我们日常生活的一部分时可能出现的各种安全和隐私问题。
{"title":"Iris recognition on consumer devices — Challenges and progress","authors":"Shejin Thavalengal, P. Corcoran","doi":"10.1109/ISTAS.2015.7439440","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439440","url":null,"abstract":"This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
"About your smartphone usage" — Privacy in location-based mobile participation “关于你的智能手机使用情况”-基于位置的移动参与的隐私
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439421
Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller
Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.
基于位置的移动工具为移动参与提供了有效的手段,使市政当局和组织能够更好地定位用户并更快地收集意见。出于参与目的,尽可能广泛地接触用户是至关重要的,为此,采用率不断提高的智能手机提供了一个最佳工具。然而,隐私问题可能会阻止基于位置的应用程序的使用,从而导致意见收集的偏见。在本文中,我们展示了一项实地研究的结果,该研究解决了隐私问题如何影响基于位置的移动参与应用程序的采用和使用,以及使用此类应用程序的动机。我们发现用户参与基于位置的投票有不同的动机,这些动机取决于所讨论的投票的类型。我们表明,关心隐私的用户不太可能受到金钱利益的激励,而是受到主题的重要性的激励,并且驱动关心隐私的用户的内在动机与驱动不关心隐私的用户的内在动机不同。最后,我们表明,基于我们的研究,隐私问题可能是采用基于位置的移动参与应用程序的一个抑制因素。
{"title":"\"About your smartphone usage\" — Privacy in location-based mobile participation","authors":"Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller","doi":"10.1109/ISTAS.2015.7439421","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439421","url":null,"abstract":"Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Insights into open innovation and ICT entrepreneurship in Africa 非洲的开放式创新和信息通信技术创业
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439447
P. Cunningham
Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.
非洲成员国正逐渐认识到创新和信息通信技术企业家精神是社会经济增长和实现国家战略目标的重要推动因素。但是,实际技能、能力、当地企业专门知识和在国家一级充分利用这一点的政策支助的水平差别很大。本研究的重点是确定影响非洲开放创新和信息通信技术创业当前水平的因素。它是由一个半结构化、适度的焦点小组提供信息的,该小组听取了来自八个非洲会员国的高级公共、教育和研究利益攸关方的观点。结果突出了六个主要因素:(a)资源优先次序反映的政治意愿水平;(b)与国家发展计划和相关资金优先事项保持一致;(c)部长和高级公务员对战略利益的理解程度;(d)一般公众的认识和敏感程度;(e)有无国家创新和企业专门知识;(f)与其他利益相关者合作以实现共同目标的意愿和能力。未来的研究将从私人、社会和国际捐助部门获取观点,并创建和验证潜在的模型/方法,以应对本研究中确定的挑战和机遇。
{"title":"Insights into open innovation and ICT entrepreneurship in Africa","authors":"P. Cunningham","doi":"10.1109/ISTAS.2015.7439447","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439447","url":null,"abstract":"Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cloud computing and mobile devices based system for healthcare application 基于云计算和移动设备的医疗保健应用系统
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439407
Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi
Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.
如今,移动设备和云计算的出现可以将医疗保健文化从直接护理服务转变为移动云计算(MCC)服务。因此,针对移动设备的应用程序与医疗保健领域的其他系统一起变得丰富。因此,我们假设该技术在医疗保健领域具有潜在的影响。世纪挑战集团提供新型的医疗服务和设施。对此,我们尝试提出了一种新的移动医疗web服务系统。本文提出的医疗移动云多代理系统(Medical Mobile Cloud Multi Agent system, 2MCMAS)是将医疗移动云多代理系统与医疗移动云多代理系统相结合,实现高效医疗的混合系统。
{"title":"Cloud computing and mobile devices based system for healthcare application","authors":"Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi","doi":"10.1109/ISTAS.2015.7439407","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439407","url":null,"abstract":"Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2015 IEEE International Symposium on Technology and Society (ISTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1