Change search
Link to record
Permanent link

Direct link
BETA
Pettersson, John SörenORCID iD iconorcid.org/0000-0001-6826-3358
Alternative names
Publications (10 of 89) Show all publications
Magnusson, M., Pettersson, J. S., Bellström, P. & Andersson, H. (2019). Developing Crisis Training Software for Local Governments: From User Needs to Generic Requirements.. In: ndersson B., Johansson B., Barry C., Lang M., Linger H., Schneider C (Ed.), Advances in Information Systems Development: Lecture Notes in Information Systems and Organisation (pp. 79-96). Cham: Springer
Open this publication in new window or tab >>Developing Crisis Training Software for Local Governments: From User Needs to Generic Requirements.
2019 (English)In: Advances in Information Systems Development: Lecture Notes in Information Systems and Organisation / [ed] ndersson B., Johansson B., Barry C., Lang M., Linger H., Schneider C, Cham: Springer, 2019, p. 79-96Chapter in book (Refereed)
Abstract [en]

In this paper, we identify, analyze and propose generic requirements for software aiming at supporting crisis management training in local governments. The study builds on a Swedish-Norwegian R&D project based on a quadruple helix model. A design science approach was applied and the artifact presented in this paper is a list of generic requirements. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. The requirements are also mapped to the problems and opportunities identified in the project. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. The presented requirements and the systems development process that was used provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training.

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
Lecture Notes in Information Systems and Organisation, ISSN 2195-4976
Keywords
Crisis Management Training · Crisis Exercises · Design Science Research · Re-quirements Engineering · User Needs Analysis
National Category
Information Systems, Social aspects
Research subject
Computer Science; Information Systems
Identifiers
urn:nbn:se:kau:diva-74875 (URN)10.1007/978-3-030-22993-1_5 (DOI)9783030229924 (ISBN)
Funder
Interreg Sweden-Norway, 20200721
Available from: 2019-09-27 Created: 2019-09-27 Last updated: 2019-11-11
Wik, M. & Pettersson, J. S. (2019). Lack of multimedia tools in intervention support for running system. International Journal of Web Science, 3(2), 148-173
Open this publication in new window or tab >>Lack of multimedia tools in intervention support for running system
2019 (English)In: International Journal of Web Science, ISSN 1757-8795, Vol. 3, no 2, p. 148-173Article in journal (Refereed) Published
Abstract [en]

Engrafting support staff into dialogues between users and customer support systems can compensate for system design flaws. Further, such dialogues can give grounds for system development. This article surveys the levels of interactivity of user support systems, where overt or covert support agents take an active part in the communication between a customer and a system. The main purpose is to demonstrate the prevailing lack of multimedia outputs in the tools supporting human intervention in systems with a graphical user interface (GUI). This is followed by an account of experimentation with human support engrafted in a web system that has a fuller range of GUI expression. The experiment explores the possibility of using multimedia in intervention in human-computer interaction and how such intervention can be built when it is not yet part of the augmented system.

Place, publisher, year, edition, pages
InderScience Publishers, 2019
Keywords
multimedia tools; intervention support; running systems; engrafting support; customer support; user support systems; multimedia output; graphical user interface; GUI; web services; human-computer interaction; web science; interactive systems; Wizard-of-Oz; WOz; user involvement
National Category
Information Systems Business Administration
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-74617 (URN)10.1504/IJWS.2019.10023834 (DOI)
Available from: 2019-09-03 Created: 2019-09-03 Last updated: 2019-09-10Bibliographically approved
Framner, E., Fischer-Hübner, S., Lorünser, T., Alaqra, A. & Pettersson, J. S. (2019). Making secret sharing based cloud storage usable. Information and Computer Security, 27(5), 647-667
Open this publication in new window or tab >>Making secret sharing based cloud storage usable
Show others...
2019 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 27, no 5, p. 647-667Article in journal (Refereed) Published
Abstract [en]

The purpose of this paper is to develop a usable configuration management for Archistar, whichutilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure andprivacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and othersettings for securely storing the secret data shares, while meeting all of end user’s requirements and otherrestrictions, is a complex task. In particular, complex trade-offs between different protection goals and legalprivacy requirements need to be made.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2019
Keywords
Privacy, Decision support systems, Usability, Security, Cloud computing, Secret sharing
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-75182 (URN)10.1108/ICS-01-2019-0016 (DOI)
Projects
Prismacloud (4805)
Funder
EU, Horizon 2020
Available from: 2019-10-09 Created: 2019-10-09 Last updated: 2019-11-07Bibliographically approved
Eilu, E. & Pettersson, J. S. (2019). Mobile Social Media for Preventing the Ebola Virus Disease Spread in Liberia and Nigeria: A Comparative Analysis (1ed.). In: Sara Paiva (Ed.), Mobile Solutions and Their Usefulness in Everyday Life: (pp. 173-188). Cham: Springer
Open this publication in new window or tab >>Mobile Social Media for Preventing the Ebola Virus Disease Spread in Liberia and Nigeria: A Comparative Analysis
2019 (English)In: Mobile Solutions and Their Usefulness in Everyday Life / [ed] Sara Paiva, Cham: Springer, 2019, 1, p. 173-188Chapter in book (Refereed)
Abstract [en]

The aftermath of the Ebola Virus Disease (EVD) crisis in West Africa in 2014 was horrific. The EVD epidemic claimed 11,315 lives and had almost a 40 per cent killing rate. The EVD had huge negative effects on social, economic and political fronts of the four most affected countries Guinea, Liberia, Sierra Leone and Nigeria. Liberia was the country worst hit and Nigeria was the least affected among them. In both countries, social media was widely used to provide public health messaging and behavioural change guidance to the population on how to avoid getting infected with the deadly EVD. However, while the use of social media significantly reduced the spread of Ebola in Nigeria by 75 per cent, it was not effective in reducing the spread of the EVD in Liberia. In this paper, we reflect factors responsible for the ineffective use of mobile social media in aiding social behavioural change guidance towards the prevention of EVD spread in Liberia and the successful use of mobile social media in doing the same in Nigeria. We further reflect on the definition of ‘mobile social media’.

Place, publisher, year, edition, pages
Cham: Springer, 2019 Edition: 1
Series
EAI/Springer Innovations in Communication and Computing, ISSN 2522-8595
Keywords
Behavioural change, Disease, Mobile communication technologies, FM radio
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-71873 (URN)10.1007/978-3-319-93491-4_9 (DOI)978-3-319-93491-4 (ISBN)978-3-319-93490-7 (ISBN)
Available from: 2019-04-18 Created: 2019-04-18 Last updated: 2019-05-02Bibliographically approved
Hamm, P., Krenn, S. & Pettersson, J. S. (2019). Secure and privacy-preserving identity and access management in CREDENTIAL. In: J.B. Bernabe & A. Skarmeta (Ed.), Challenges in Cybersecurity and Privacy: the European Research Landscape (pp. 271-284). Delft: River Publishers
Open this publication in new window or tab >>Secure and privacy-preserving identity and access management in CREDENTIAL
2019 (English)In: Challenges in Cybersecurity and Privacy: the European Research Landscape / [ed] J.B. Bernabe & A. Skarmeta, Delft: River Publishers, 2019, p. 271-284Chapter in book (Refereed)
Abstract [en]

In an increasingly interconnected world, establishing trust between endusers and service providers with regards to privacy and data protectionis becoming increasingly important. Consequently, CREDENTIAL, fundedunder the European Union’s H2020 framework programme, was dedicated tothe development of a cloud-based service for identity provisioning and datasharing. The system aimed at offering both high confidentiality and privacyguarantees to the data owner, and high authenticity guarantees to the receiver. This was achieved by integrating advanced cryptographic mechanisms intostandardized authentication protocols. The developed solutions were testedin pilots from three critical sectors, which proved that high user convenience,strong security, and practical efficiency can be achieved at the same timethrough a single system.

Place, publisher, year, edition, pages
Delft: River Publishers, 2019
Series
River Publishers Series in Security and Digital Forensics
National Category
Computer Sciences Information Systems Information Systems, Social aspects
Research subject
Information Systems; Computer Science
Identifiers
urn:nbn:se:kau:diva-73283 (URN)10.13052/rp-9788770220873 (DOI)9788770220880 (ISBN)9788770220873 (ISBN)
Projects
CREDENTIAL
Funder
EU, Horizon 2020, 653454
Available from: 2019-09-02 Created: 2019-09-02 Last updated: 2019-09-10Bibliographically approved
Magnusson, M., Pettersson, J. S., Bellström, P. & Andersson, H. (2018). Developing crisis training software for local governments: From user needs to generic requirements. In: B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider (Ed.), Information Systems Development: Designing Digitalization (ISD2018 Proceedings). Paper presented at The 27th International Conference on Information Systems Development (ISD2018)Lund 22-24 Augusti. Lunds universiet
Open this publication in new window or tab >>Developing crisis training software for local governments: From user needs to generic requirements
2018 (English)In: Information Systems Development: Designing Digitalization (ISD2018 Proceedings) / [ed] B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider, Lunds universiet , 2018, p. -12Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we analyze and present the generic requirements identified for a software aiming at supporting crisis management training in local governments. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. Moreover, the requirements are mapped to problems as well as opportunities. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. In our work we applied a design science approach and the artifact presented in this paper is a list of generic requirement. The presented requirements and the systems development process used, provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training

Place, publisher, year, edition, pages
Lunds universiet, 2018
Keywords
Crisis Training, Crisis Exercises, Design Science Research, Requirements Engineering, Needs Analysis
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-69314 (URN)978-91-7753-876-9 (ISBN)
Conference
The 27th International Conference on Information Systems Development (ISD2018)Lund 22-24 Augusti
Funder
Interreg Sweden-Norway, 20200721
Available from: 2018-09-19 Created: 2018-09-19 Last updated: 2019-07-12Bibliographically approved
Karegar, F., Pettersson, J. S. & Fischer-Hübner, S. (2018). Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).: . Paper presented at The 3rd SECPID Workshop in the 13th International Conference on Availability, Reliability and Security (ARES 2018), August 27-30, 2018, Hamburg, Germany.. New York, NY, USA: Association for Computing Machinery (ACM), Article ID 39.
Open this publication in new window or tab >>Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
2018 (English)In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)., New York, NY, USA: Association for Computing Machinery (ACM), 2018, article id 39Conference paper, Published paper (Refereed)
Abstract [en]

Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issues. The study furthermore yields some results concerning individuals' attitudes towards how sensitive the use of fingerprint sensors is: non-users tended to be more afraid of third-party access than users. On the other hand, users tended to regard the fingerprint pattern as more sensitive than non-users.

This study also manages to give some methodological contributions, namely that mockup user interfaces do not bias the parameters studied in this paper (e.g. understanding of access to fingerprint data), and that self-estimation of knowledge in Computer Security is not a good indicator of respondents' understanding of fingerprint security and privacy. Moreover, people who connected a low degree of sensitivity to fingerprint patterns gave very different reasons for their estimation of sensitivity. This prompts for more research, as it is unclear if different groups would benefit from different information and modes of visualisation to understand what are the issues involved in fingerprint recognition on mobile devices.

Place, publisher, year, edition, pages
New York, NY, USA: Association for Computing Machinery (ACM), 2018
Keywords
Fingerprint Pattern, User Perception, Sensitive Information, Data Privacy
National Category
Computer Sciences Human Computer Interaction
Identifiers
urn:nbn:se:kau:diva-70227 (URN)10.1145/3230833.3234514 (DOI)000477981800077 ()978-1-4503-6448-5 (ISBN)
Conference
The 3rd SECPID Workshop in the 13th International Conference on Availability, Reliability and Security (ARES 2018), August 27-30, 2018, Hamburg, Germany.
Projects
CREDENTIAL
Funder
EU, Horizon 2020, 653454
Available from: 2018-11-21 Created: 2018-11-21 Last updated: 2019-11-01Bibliographically approved
Pettersson, J. S., Wik, M. & Andersson, H. (2018). GUI interaction interviews in the evolving map of design research. Lecture Notes in Information Systems and Organisation, 26, 149-167
Open this publication in new window or tab >>GUI interaction interviews in the evolving map of design research
2018 (English)In: Lecture Notes in Information Systems and Organisation, ISSN 2195-4968, Vol. 26, p. 149-167Article in journal (Refereed) Published
Abstract [en]

This chapter presents GUI-ii, Graphical User Interface interaction interview, a method used to remotely discuss, develop and test GUI prototypes with users and stakeholders. Examples of such sessions are presented to demonstrate that the main benefit of GUI-ii is that this way of co-designing allows for interaction-informed discussions around functions and user interfaces, where re-design and hands-on experience can be integrated and efficiently carried out remotely. Using a facilitation tool to enact GUI layout and responses allows participation and evaluation to be mixed in participatory design sessions in a productive way. This form of participatory design is discussed along the dimensions found in Sanders’ Map of Design Research. The discussion concludes that GUI-ii facilitates participation by relaxing demands for physical presence and by allowing people to participate from their own work environment while still making it easy for them to directly influence contents, structure and interaction.

Place, publisher, year, edition, pages
Springer, 2018
Keywords
Design research, GUI-ii, Interview techniques, Participatory design
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-68068 (URN)10.1007/978-3-319-74817-7_10 (DOI)2-s2.0-85048007892 (Scopus ID)
Available from: 2018-06-26 Created: 2018-06-26 Last updated: 2018-06-27Bibliographically approved
Länger, T., Alaqra, A., Framner, E., Pettersson, J. S. & Reimer, K. (2018). HCI patterns for cryptographically equipped cloud services. In: Kuroso, M (Ed.), : . Springer
Open this publication in new window or tab >>HCI patterns for cryptographically equipped cloud services
Show others...
2018 (English)Conference paper (Refereed)
Place, publisher, year, edition, pages
Springer, 2018
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-67347 (URN)10.1007/978-3-319-91238-7_44 (DOI)000450991000044 ()978-3-319-91237-0 (ISBN)978-3-319-91238-7 (ISBN)
Available from: 2018-05-23 Created: 2018-05-23 Last updated: 2019-02-25Bibliographically approved
Bellström, P. & Pettersson, J. S. (2018). Page Owner Comments on Page User Posts. A PilotStudy of Three Swedish Municipalities. In: Virkar, S., Parycek, P., Edelmann, N., Glassey, O., Janssen, M., Scholl, H J., Tambouris, E. (Ed.), Proceedings of the International Conference EGOV-CeDEM-ePart 2018: . Paper presented at EGOV-CeDEM-ePART Conference 3-5 sep Danube University Krems, Austria (pp. 81-89).
Open this publication in new window or tab >>Page Owner Comments on Page User Posts. A PilotStudy of Three Swedish Municipalities
2018 (English)In: Proceedings of the International Conference EGOV-CeDEM-ePart 2018 / [ed] Virkar, S., Parycek, P., Edelmann, N., Glassey, O., Janssen, M., Scholl, H J., Tambouris, E., 2018, p. 81-89Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we present a pilot study of page owner comments on page user posts.Analysed data consist of the page user posts on three Swedish municipalities Facebook pages inone month. In general, it can be concluded that all three municipalities comment on page userposts to quite a large or even large extent (92%, 69% and 52%). The 42-page user posts thatwere left uncommented mainly belong to the categories of expressing an opinion, sharinginformation and requesting information. Taken together, these categories were identified in 76percent of the analysed page user posts. Because they are also the top three categories for userposts in general, further questions are prompted as to where municipalities satisfy requests forinformation or if other users provide answers.

Keywords
social media, Facebook, page owner comments, page user posts, content analysis
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-69315 (URN)978-3-903150-22-5 (ISBN)
Conference
EGOV-CeDEM-ePART Conference 3-5 sep Danube University Krems, Austria
Available from: 2018-09-19 Created: 2018-09-19 Last updated: 2019-02-28Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6826-3358

Search in DiVA

Show all publications