Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439414
P. Catherwood, D. Finlay, J. Mclaughlin
This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.
{"title":"Subcutaneous body area networks: A SWOT analysis","authors":"P. Catherwood, D. Finlay, J. Mclaughlin","doi":"10.1109/ISTAS.2015.7439414","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439414","url":null,"abstract":"This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439422
T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu
The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.
{"title":"Mobile cloud computing for disaster emergency operation: A systematic review","authors":"T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu","doi":"10.1109/ISTAS.2015.7439422","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439422","url":null,"abstract":"The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439445
L. Robertson, K. Michael, Albert Munoz Aneiros
Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.
{"title":"Supply system's technology configuration as a contributor to end-user vulnerability","authors":"L. Robertson, K. Michael, Albert Munoz Aneiros","doi":"10.1109/ISTAS.2015.7439445","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439445","url":null,"abstract":"Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of \"exposure\" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"268 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439415
Rossouw de Bruin, S. V. Solms
The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a "Cyber Security Governance Maturity dashboard", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.
{"title":"Modelling Cyber Security Governance Maturity","authors":"Rossouw de Bruin, S. V. Solms","doi":"10.1109/ISTAS.2015.7439415","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439415","url":null,"abstract":"The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a \"Cyber Security Governance Maturity dashboard\", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439429
Ivan Ganchev, Zhanlin Ji, M. O'Droma
This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.
{"title":"Making the UCWW a reality","authors":"Ivan Ganchev, Zhanlin Ji, M. O'Droma","doi":"10.1109/ISTAS.2015.7439429","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439429","url":null,"abstract":"This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439408
J. Achora, H. Sseguya
This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the "change agents" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf
{"title":"ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya","authors":"J. Achora, H. Sseguya","doi":"10.1109/ISTAS.2015.7439408","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439408","url":null,"abstract":"This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the \"change agents\" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439440
Shejin Thavalengal, P. Corcoran
This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.
{"title":"Iris recognition on consumer devices — Challenges and progress","authors":"Shejin Thavalengal, P. Corcoran","doi":"10.1109/ISTAS.2015.7439440","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439440","url":null,"abstract":"This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439407
Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi
Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.
如今,移动设备和云计算的出现可以将医疗保健文化从直接护理服务转变为移动云计算(MCC)服务。因此,针对移动设备的应用程序与医疗保健领域的其他系统一起变得丰富。因此,我们假设该技术在医疗保健领域具有潜在的影响。世纪挑战集团提供新型的医疗服务和设施。对此,我们尝试提出了一种新的移动医疗web服务系统。本文提出的医疗移动云多代理系统(Medical Mobile Cloud Multi Agent system, 2MCMAS)是将医疗移动云多代理系统与医疗移动云多代理系统相结合,实现高效医疗的混合系统。
{"title":"Cloud computing and mobile devices based system for healthcare application","authors":"Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi","doi":"10.1109/ISTAS.2015.7439407","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439407","url":null,"abstract":"Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439398
S. Winberg
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.
{"title":"Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plants","authors":"S. Winberg","doi":"10.1109/ISTAS.2015.7439398","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439398","url":null,"abstract":"The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439397
C. Winberg, S. Pather, M. D. Plessis
This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of "the innovation journey", as well as emerging understandings of "temporality" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.
{"title":"Supporting a culture of innovation at a new university of technology","authors":"C. Winberg, S. Pather, M. D. Plessis","doi":"10.1109/ISTAS.2015.7439397","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439397","url":null,"abstract":"This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of \"the innovation journey\", as well as emerging understandings of \"temporality\" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}