Change search
Refine search result
12 1 - 50 of 100
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Alaqra, Ala
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013).
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013).
    Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario2016In: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance / [ed] Nathan Clarke & Steven Furnell, 2016, p. 220-230Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

    Download full text (pdf)
    fulltext
  • 2.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Camenisch, Jan
    IBM Zurich Research Laboratory, Switzerland.
    Crane, Stephen
    Hewlett-Packard Laboratories, UK.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Leenes, Ronald
    Tilburg University, the Netherlands.
    Pearson, Siani
    Hewlett-Packard Laboratories, UK.
    Pettersson, John Sören
    Karlstad University, Division for Information Technology.
    Sommer, Dieter
    IBM Zurich Research Laboratory, Switzerland.
    Trust in PRIME2005In: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, p. 552-559Conference paper (Other academic)
    Abstract [en]

    The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

  • 3.
    Baguma, Rehema
    et al.
    Makerere University, UGA.
    Pettersson, John SörenKarlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Proceedings of the 6th International Conference on M4D Mobile Communication Technology for Development: M4D 2018, 15-16 November 2018, Kampala, Uganda2018Conference proceedings (editor) (Refereed)
    Download full text (pdf)
    fulltext
  • 4.
    Bellström, Peter
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Magnusson, Monika
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Thorén, Claes
    Uppsala University.
    Facebook Usage in a Local Government: A Content Analysis of Page Owner Posts and User Posts2016In: Transforming Government: People, Process and Policy, ISSN 1750-6166, E-ISSN 1750-6174, Vol. 10, no 4, p. 548-567Article in journal (Refereed)
  • 5.
    Bellström, Peter
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Persson, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Political, Historical, Religious and Cultural Studies (from 2013).
    Magnusson, Monika
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Wik, Malin
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Venemyr, Geir Ove
    Inland Norway University of Applied Sciences.
    Hindersson, Emelie
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Center for Societal Risk Research, CSR (from 2020).
    Canvas som plattform för digitala krisövningar: Några första resultat från en demonstrationsövning2020In: Kursdesign i Canvas: Bidrag från universitetspedagogisk konferens 2019 / [ed] Niklas Jakobsson och Carina Vikström, Karlstad: Karlstads universitet, 2020, p. 11-42Chapter in book (Other academic)
    Abstract [sv]

    Övning ger färdighet och det gäller inte bara i traditionell undervisning utan också vid krisledning. Krisledning kännetecknas av att medlemmarna i en krisledningsgrupp ska ansvara för sina respektive verksamhetsområden och genom snabb interaktion och samordning över verksamhetsgränserna mildra effekterna av krisen för organisationen eller samhället som helhet. Det innebär att rollmedvetenhet och kommunikationsförmåga måste tränas för den enskilde så väl som för gruppen som helhet. På gruppnivå är också samverkan och koordinering internt och externt viktigt att öva. Tidigare studier visar att organisationer är intresserade av möjligheten att öva mer via digitala verktyg (Wik et al., 2017). Inom ramen för det till och med 2021 pågående Interregprojektet CriseIT 2 utvecklar vi ett koncept för övningsstöd baserat på lärplattformar. Kapitlet beskriver genom en fallstudie hur en seminarieövning kan genomföras med stöd av lärplattformen Canvas. Data till studien har samlats in genom observationer, enkäter, storgruppsdiskussion och deltagarnas indata till Canvas. Erfarenheter från fallstudien sammanfattas i möjligheter, problem och förbättringsbehov kopplade till Canvas och övningsdesignen, och rekommendationer ges både för krisövning och för undervisning baserad på problematisering och dilemmaövningar i klassrummet.

    Download full text (pdf)
    fulltext
  • 6.
    Bellström, Peter
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Page Owner Comments on Page User Posts. A PilotStudy of Three Swedish Municipalities2018In: Proceedings of the International Conference EGOV-CeDEM-ePart 2018 / [ed] Virkar, S., Parycek, P., Edelmann, N., Glassey, O., Janssen, M., Scholl, H J., Tambouris, E., 2018, p. 81-89Conference paper (Refereed)
    Abstract [en]

    In this paper, we present a pilot study of page owner comments on page user posts.Analysed data consist of the page user posts on three Swedish municipalities Facebook pages inone month. In general, it can be concluded that all three municipalities comment on page userposts to quite a large or even large extent (92%, 69% and 52%). The 42-page user posts thatwere left uncommented mainly belong to the categories of expressing an opinion, sharinginformation and requesting information. Taken together, these categories were identified in 76percent of the analysed page user posts. Because they are also the top three categories for userposts in general, further questions are prompted as to where municipalities satisfy requests forinformation or if other users provide answers.

  • 7. Bergander, M.
    et al.
    de Haan, J.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pilotprojekt hösten 2004 inom området systemlösningar för mobiltjänster i arenamiljö2004Report (Other academic)
  • 8. Bergmann, Mike
    et al.
    Rost, Martin
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology2006In: Advances in Information Systems Development: Bridging the Gap between Academia and Industry. Volume 1 / [ed] Nilsson, Gustas, Wojtkowski, Wojtkowski, Wrycza, Zupancic, New York: Springer , 2006, p. 437-448Conference paper (Refereed)
  • 9.
    Casap, Lucia
    et al.
    Academy of Economic Studies, Moldova.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    The E-governance Development in Educational Sector of Republic of Moldova2017In: Electronic Government: 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings / [ed] Marijn Janssen, Karin Axelsson, Olivier Glassey, Bram Klievink, Robert Krimmer, Ida Lindgren, Peter Parycek, Hans J. Scholl, Dmitrii Trutnev, Cham: Springer, 2017, p. 177-186Conference paper (Refereed)
    Abstract [en]

    During the last years e-governance is being implemented in many countries. Within the same country, the level of achieved results can vary significantly between sectors. The implementation of e-governance in the Republic of Moldova has had a good start but some stagnation in the implementation of the e-governance agenda is registered. In the educational sector, the implementation is still at a low level. This practical paper surveys the e-tools in the educationa lsector of the Republic of Moldova, thus revealing the e-governance level of the sector. By comparing with the usage of IT tools in the Swedish educational system, and identifying the benefits and issues met during their development, it proposes a way for future implementation of the e-governance agenda in the educational sector in Moldova. While Moldova as a country has extensive Internet coverage, Sweden was choose for the comparison because of its Internet coverage plus its focus on furthering the skills of its workforce and also the considerable efforts of e-governance agenda implementation.

  • 10.
    Eilu, Emmanuel
    et al.
    Makerere University.
    Baguma, Rehema
    Makerere University.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    M-voting in developing countries: Findings from Uganda2015In: Commonwealth Governance Handbook 2014/15.: Democracy, development and public administration, Cambridge: Nexus , 2015, p. 25-28Chapter in book (Other academic)
  • 11.
    Eilu, Emmanuel
    et al.
    Makerere University.
    Baguma, Rehema
    Makerere University.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Persuasion and Acceptance of Mobile Phones as a Voting Tool in Developing Countries2014In: Proceedings of the 4th International Conference on M4D Mobile Communication for Development: M4D 2014, General Tracks / [ed] Ibrahima Niang, Christelle Scharff & Caroline Wamala, 2014, p. 83-94Conference paper (Refereed)
    Abstract [en]

    Voter turn-up in many developing countries is unpredictable due to violence, intimidation, dictatorship and many other reasons. Mobile phone technology could offer governments of developing countries a direct conduit to its citizens which potentially increase citizen participation in voting and decision making. However, studies show that mobile phones have failed to gain much acceptance and satisfaction as an e-voting tool in developing countries. In this paper, we discuss the extent to which persuasion and acceptance design principles can contribute to the acceptance and usage of mobile phones as an end device for voting in a developing country like Uganda. This study used a quantitative approach where 900 questionnaires were given to respondents of voting age, mixed in gender, literacy levels, income levels, occupation and type of mobile phone owned. Using this sample space, we explored the different design principles of persuasion and acceptance towards the use of mobile phones as a voting tool i.e. whether the respondents would be encouraged to use their mobile phones for voting if certain persuasive and acceptance design conditions are met. The study found out that the principle of tunneling, effective computing and credibility, social/political learning, and perceived usefulness greatly influences persuasion and acceptance towards using mobile phones for voting in developing countries.

  • 12.
    Eilu, Emmanuel
    et al.
    Uganda Christian University, Mbale University College, UGA.
    Baguma, RehemaMakerere University, UGA.Pettersson, John SörenKarlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).Bhuktar, Ganesh D.Vishwakarma Institute of Technology (VIT), IND.
    Digital Literacy and Socio-Cultural Acceptance of ICT in Developing Countries2021Collection (editor) (Refereed)
    Abstract [en]

    This book discusses the role of human computer interaction (HCI) design in fostering digital literacy and promoting socio-cultural acceptance and usage of the  latest ICT innovations in developing countries. The book presents techniques, theories, case studies, and methodologies in HCI design approaches that have been used to foster digital literacy, break the socio-cultural barriers to ICT adoption, and promote the widespread usage of the latest innovations in the health, agriculture, economic, education and social sectors in developing countries. The authors provide insights on how crossing disciplines in HCI such as usability design, user centered design, user experience, anticipated user experience, technology acceptance design, persuasive design, philosophical designs, motivational design, social-cultural oriented designs, and other HCI design approaches have promoted digital literacy and stimulated socio-cultural acceptance and the usage of the latest ICT innovations. The book is relevant in academic, industry and government.

    Presents theoretical, practical, and socio-cultural approaches to digital literacy challenges in developing countries;Discusses recent ICT and HCI innovations used to transform the health, agriculture, economic, education and social sectors in developing countries;Provides insights on design opportunities and challenges presented in countries where digital literacy is very low and with complex socio-cultural dynamics.

  • 13.
    Eilu, Emmanuel
    et al.
    Uganda Christian University, Mbale University College, Mbale, Uganda.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Mobile Social Media for Preventing the Ebola Virus Disease Spread in Liberia and Nigeria: A Comparative Analysis2019In: Mobile Solutions and Their Usefulness in Everyday Life / [ed] Sara Paiva, Cham: Springer, 2019, 1, p. 173-188Chapter in book (Refereed)
    Abstract [en]

    The aftermath of the Ebola Virus Disease (EVD) crisis in West Africa in 2014 was horrific. The EVD epidemic claimed 11,315 lives and had almost a 40 per cent killing rate. The EVD had huge negative effects on social, economic and political fronts of the four most affected countries Guinea, Liberia, Sierra Leone and Nigeria. Liberia was the country worst hit and Nigeria was the least affected among them. In both countries, social media was widely used to provide public health messaging and behavioural change guidance to the population on how to avoid getting infected with the deadly EVD. However, while the use of social media significantly reduced the spread of Ebola in Nigeria by 75 per cent, it was not effective in reducing the spread of the EVD in Liberia. In this paper, we reflect factors responsible for the ineffective use of mobile social media in aiding social behavioural change guidance towards the prevention of EVD spread in Liberia and the successful use of mobile social media in doing the same in Nigeria. We further reflect on the definition of ‘mobile social media’.

  • 14. Ellegård, Alvar
    et al.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pedersén, Olof
    Alfabet2000In: Nationalencyklopedin, 2:a uppl. (=Supplementbanden, DVD,, webbplats www.ne.se), Höganäs: Bra Böckers Bokförlag , 2000Chapter in book (Other academic)
  • 15.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Soren
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Bergmann, Mike
    Tech Univ Dresden, Dresden, Germany..
    Hansen, Marit
    Pearson, Siani
    HP Labs, Mississauga, ON, Canada..
    Mont, Marco Casassa
    HP Labs, Mississauga, ON, Canada..
    Human-Computer Interaction2011In: Digital privacy: PRIME - Privacy and identity management for Europe / [ed] Camenisch, Jan; Leenes, Ronald; Sommer, Dieter, Springer, 2011, p. 569-595Chapter in book (Refereed)
  • 16.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Evaluation of early prototypes (D[6-12].1.a): Public EU6FP IST deliverable2004Report (Refereed)
    Abstract [en]

    This document captures the results of the evaluation and analysis of these early prototypes and user interface mock-ups. The evaluation is done with reference to the legal, social, economic and application requirements documented in D1.1a. Besides, usability testing is performed to evaluate mock-ups and early prototypes from an HCI perspective. This evaluation should guide the future technical development and provide input to the selection of application scenarios for which application prototypes will be developed

  • 17.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Evaluation of Integrated Prototype Version 2: PRIME EU Project Deliverable D6.1.e2007Report (Refereed)
  • 18.
    Fischer Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable Privacy and Identity Management: Challenges and Approaches2008Conference paper (Other (popular science, discussion, etc.))
  • 19.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable privacy-enhancing Identity Management: Challenges and Approaches2010In: Information and Communication Technologies, Society and Human Beings: Theory and Framework (Festschrift in honor of Gunilla Bradley) / [ed] Darek Haftor, Anita Mirijamdotter, Hershey PA: IGI Global, 2010, p. 172-189Chapter in book (Refereed)
    Abstract [en]

    A critical success factor for Privacy-Enhancing Technologies (PETs), and for Privacy-Enhancing Identity Management in particular, will be user-friendly and intelligible user interfaces that are legally compliant and convey trust. Such user interfaces have to meet challenges such as the user-friendly representation of complex PET concepts (such as “pseudonyms”, “unlinkabilty” or “anonymous credentials”) that are unfamiliar to many users, the provision of security, the enforcement of legal privacy principles, such as informed consent or transparency, as well as the mediation of reliable trust to the end users. In this paper, we will discuss such challenges for usable privacy-enhancing identity management and will provide some HCI guidelines for addressing those challenges.

  • 20.
    Fischer-Hübner, Simone
    et al.
    Karlstad University, Division for Information Technology.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    HCI requirements for Transparency and Accountability Tools for Cloud Service Chains2015In: Accountability and Security for the Cloud: First Summer School, Cloud Acountability Project, A4Cloud / [ed] Massimo Felici, Carmen Fernández-Gago, Cham: Springer, 2015, p. 81-113Chapter in book (Refereed)
    Abstract [en]

    This paper elaborates HCI (Human-Computer Interaction) requirementsfor making cloud data protection tools comprehensible and trustworthy.The requirements and corresponding user interface design principles are derivedfrom our research and review work conducted to address in particular the followingHCI challenges: How can the users be guided to better comprehend theflow and traces of data on the Internet and in the cloud? How can individual endusers be supported to do better informed decisions on how their data can be usedby cloud providers or others? How can the legal privacy principle of transparencyand accountability be enforced by the user interfaces of cloud inspectiontools? How can the user interfaces help users to reassess their trust/distrust inservices? The research methods that we have used comprise stakeholderworkshops, focus groups, controlled experiments, usability tests as well as literatureand law reviews. The derived requirements and principles are groupedinto the following functional categories: (1) ex-ante transparency, (2) exercisingdata subject rights, (3) obtaining consent, (4) privacy preference management,(5) privacy policy management, (6) ex-post transparency, (7) audit configuration,(8) access control management, and (9) privacy risk assessment. This broadcategorization makes our results accessible and applicable for any developerwithin the field of usable privacy and transparency-enhancing technologies forcloud service chains.

  • 21.
    Framner, Erik
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lorünser, Thomas
    Austrian Institute of Techno Department of Safety and Security, AUT.
    Alaqra, Ala Sarah
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Making secret sharing based cloud storage usable2019In: Information and Computer Security, E-ISSN 2056-4961, Vol. 27, no 5, p. 647-667Article in journal (Refereed)
    Abstract [en]

    The purpose of this paper is to develop a usable configuration management for Archistar, whichutilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure andprivacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and othersettings for securely storing the secret data shares, while meeting all of end user’s requirements and otherrestrictions, is a complex task. In particular, complex trade-offs between different protection goals and legalprivacy requirements need to be made.

    Download full text (pdf)
    fulltext
  • 22.
    Hamm, Peter
    et al.
    Goethe Universität Frankfurt, Germany.
    Krenn, Stephen
    AIT Austrian Institute of Technology GmbH, Austria.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Secure and privacy-preserving identity and access management in CREDENTIAL2019In: Challenges in Cybersecurity and Privacy: the European Research Landscape / [ed] J.B. Bernabe & A. Skarmeta, Delft: River Publishers, 2019, p. 271-284Chapter in book (Refereed)
    Abstract [en]

    In an increasingly interconnected world, establishing trust between endusers and service providers with regards to privacy and data protectionis becoming increasingly important. Consequently, CREDENTIAL, fundedunder the European Union’s H2020 framework programme, was dedicated tothe development of a cloud-based service for identity provisioning and datasharing. The system aimed at offering both high confidentiality and privacyguarantees to the data owner, and high authenticity guarantees to the receiver. This was achieved by integrating advanced cryptographic mechanisms intostandardized authentication protocols. The developed solutions were testedin pilots from three critical sectors, which proved that high user convenience,strong security, and practical efficiency can be achieved at the same timethrough a single system.

    Download full text (pdf)
    fulltext
  • 23. Hansen, Marit
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Bergmann, Mike
    Transparency Tools for User-Controlled Identity Management2007Conference paper (Refereed)
  • 24.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindegren, Daniel
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Assessments of a Cloud-Based Data Wallet for Personal Identity Management2017In: Information Systems Development: Advances in Methods, Tools and Management (ISD2017 Proceedings), 2017Conference paper (Refereed)
    Abstract [en]

    Within a project developing cloud technology for identity access management, usability tests of mockups of a mobile app identity provider were conducted to assess users’ consciousness of data disclosures in consent forms and flow of authentication data. Results show that using one’s fingerprint for giving consent was easy, but most participants had not a correct view of where the fingerprint data is used and what entities would have access to it. Familiarity with ID apps appeared to aggravate misunderstanding. In addition, participants could not well recall details of personal data releases and settings for disclosure options. An evaluation with a confirmation screen slightly improved recall rate. However, some participants voiced a desire to have control over their data and expressed a wish to manually select mandatory information. This can be a way of slowing users down and make them reflect more.

    Download full text (pdf)
    fulltext
  • 25.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindegren, Daniel
    Karlstad University.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    User Evaluations of an App Interface for Cloud-Based Identity Management2018In: Advances in Information Systems Development / [ed] Paspallis N., Raspopoulos M., Barry C., Lang M., Linger H., Schneider C., Cham: Springer, 2018, Vol. 26, p. 205-223Conference paper (Refereed)
    Abstract [en]

    Within a project developing cloud technology for identity access management, usability tests of the mock-up of a mobile app identity provider were conducted to assess Internet users’ consciousness of data disclosures in consent forms and their comprehension of the flow of authentication data. Results show that using one’s fingerprint for giving consent was easy, but most participants did not have a correct view of where the fingerprint data is used and what entities would have access to it. Familiarity with ID apps appeared to aggravate misunderstanding. In addition, participants could not well recall details of personal data releases and settings for disclosure options. An evaluation with a confirmation screen improved the recall rate slightly. However, some participants voiced a desire to have control over their data and expressed a wish to manually select mandatory information. This can be a way of slowing users down and make them reflect more.

  • 26.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood2018In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)., New York, NY, USA: Association for Computing Machinery (ACM), 2018, article id 39Conference paper (Refereed)
    Abstract [en]

    Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issues. The study furthermore yields some results concerning individuals' attitudes towards how sensitive the use of fingerprint sensors is: non-users tended to be more afraid of third-party access than users. On the other hand, users tended to regard the fingerprint pattern as more sensitive than non-users.

    This study also manages to give some methodological contributions, namely that mockup user interfaces do not bias the parameters studied in this paper (e.g. understanding of access to fingerprint data), and that self-estimation of knowledge in Computer Security is not a good indicator of respondents' understanding of fingerprint security and privacy. Moreover, people who connected a low degree of sensitivity to fingerprint patterns gave very different reasons for their estimation of sensitivity. This prompts for more research, as it is unclear if different groups would benefit from different information and modes of visualisation to understand what are the issues involved in fingerprint recognition on mobile devices.

  • 27.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention2020In: ACM Transactions and Security, ISSN 2471-2566, Vol. 23, no 1, p. 1-38, article id 5Article in journal (Refereed)
    Abstract [en]

    Privacy notices and consent forms are the means of conveying privacy policy information to users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite previous research, it is not yet clear whether user engagement with consent forms via different types of interactions for confirming consent may play a significant role in effectively drawing user attention to the content, even after repeated exposure. We investigate, in a laboratory study, how different types of interactions that engage users with consent forms differ in terms of their effectiveness, efficiency, and user satisfaction. In addition, we examine if and how habituation affects user attention and satisfaction, and the time they spend on giving their consent. We conducted a controlled experiment with 80 participants in four different groups where people either were engaged actively with the policy content via Drag and Drop (DAD), Swipe, or Checkboxes, or were not actively engaged with the content (as the control condition) in a first-exposure phase and in a habituation phase. We measured user attention to consent forms along multiple dimensions, including direct, objective measurements and indirect, self-reported measures. Our results show that the different types of interactions

    may affect user attention to certain parts of policy information. In particular, the DAD action results in significantly more user attention to the data items compared to other groups. However, with repeated exposure to consent forms, the difference disappears. We conclude that user engagement with policy content needs to be designed with care, so that attention to substantial policy information is increased and not negatively affected.

    Download full text (pdf)
    fulltext
  • 28.
    Kostopoulos, Alexandros
    et al.
    Hellenic Telecommunications Organization R&D Athens, Greece, GRC.
    Sfakianakis, Evangelos
    Hellenic Telecommunications Organization R&D, Athens, Greece, GRC.
    Chochliouros, Ioannis
    Hellenic Telecommunications Organization R&D, Athens, Greece, GRC.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Krenn, Stephan
    AIT Austrian Institute of Technology, Vienna, Austria, AUT.
    Tesfay, Welderufael
    Goethe University Frankfurt, Frankfurt, Germany, DEU.
    Migliavacca, Andrea
    Lombardia Informatica S.p.A., Milan, Italy, ITA.
    Hörandner, Felix
    Graz University of Technology, Graz, Austria, AUT.
    Towards the Adoption of Secure Cloud Identity Services2017In: ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security, New York: Association for Computing Machinery (ACM), 2017, p. 1-7, article id 90Conference paper (Refereed)
    Abstract [en]

    Enhancing trust among service providers and end-users with respect to data protection is an urgent matter in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end con€dentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key bene€ts as convincing arguments.

  • 29.
    Lindegren, Daniel
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Karegar, Farzaneh
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    An evaluation of three designs to engage users when providing their consent on smartphones2021In: Behavior and Information Technology, ISSN 0144-929X, E-ISSN 1362-3001, Vol. 40, no 4, p. 398-414Article in journal (Refereed)
    Abstract [en]

    The graphical and interactive design of a consent form helps individuals to keep control and pay attention to the information that they are disclosing. In the context of mobile apps we propose and test alternative interaction design solutions for selecting personal information on permission dialogues, namely using checkboxes, a drag-and-drop selection, and a swiping action. We test each proposed design and compare the results in terms of their usability and effectiveness in helping users to be more attentive and aware of their data flow, in other words, to provide their informed consent. This study demonstrates that checkboxes while speedy do not engage the user as much as drag-and-drop or swiping. User satisfaction is positively impacted by these newer ways of giving consent.

    Download full text (pdf)
    fulltext
  • 30.
    Länger, Thomas
    et al.
    Université de Lausanne, Switzerland.
    Alaqra, Ala
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Framner, Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Reimer, Katrin
    XiTrust Secure Technologies GmbH, Austria.
    HCI patterns for cryptographically equipped cloud services2018In: Human-Computer Interaction. Theories, Methods, and Human Issues / [ed] Masaaki Kurosu, Springer, 2018, p. 567-586Conference paper (Refereed)
    Abstract [en]

    Recent cryptographic research has devised several new algorithms and protocols with a potential of mitigating several of the most ardent security and privacy threats, existing in currently available public cloud services. Nevertheless, such cryptographic schemes often exhibit counterintuitive functionality to end users, or they work differently to other already established traditional schemes with which users are already familiar. A practical solution to address these problems involves a human centered design approach, deriving Human Computer Interaction (HCI) requirements from consultations and extensive testing with experts, prospective end users, and other stakeholders. The European Horizon 2020 project PRISMACLOUD “Privacy and Security Maintaining Services for the Cloud” uses such an approach and provides HCI patterns as part of its proper cloud service development methodology CryptSDLC to communicate HCI requirements to cloud service designers and user interface implementers. In this article, we present several new cryptographic cloud services, e.g. for redacting digitally signed data, and for redundant storage and sharing of confidential data in a public cloud scenario, together with three example HCI patterns for specific interactions of end users with these services. We show how these patterns were elaborated and validated in practice to prove the suitability for their intended purpose. To summarize, we give an account on our practical experience during the actual prototype development and implementation and show how they constitute an essential element of the CryptSDLC development methodology.

    Download full text (pdf)
    fulltext
  • 31.
    Magnusson, Monika
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Persson, Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Centre for Climate and Safety (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Political, Historical, Religious and Cultural Studies (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Bellström, Peter
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Venemyr, Geir Ove
    Høgskolen i Innlandet – Fakultet for økonomi og samfunnsvitenskap, Institutt for organisasjon, ledelse, styring .
    Tallak Bakken, Bjørn
    Høgskolen i Innlandet – Fakultet for økonomi og samfunnsvitenskap, Institutt for organisasjon, ledelse, styring.
    Pettersson, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Centre for Climate and Safety (from 2013).
    Hindersson, Emelie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Centre for Climate and Safety (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Political, Historical, Religious and Cultural Studies (from 2013).
    Digitalisering av krisövning: Erfarenheter från CriseIT-projekten2021Report (Other academic)
    Abstract [sv]

    Genomförandet av övningar är en nyckel till stärkt förmåga att agera effektivt i kris. CriseIT-projekten har haft som mål att bidra till detta genom att skapa möjligheter för kommuner och andra aktörer med krisövningsbehov att öva enklare och oftare.

    Det finns en önskan om, och en medvetenhet om behoven av, att öva mer än vad som görs i nuläget i många organisationer. Digitala verktyg är ett sätt att göra det möjligt att öva oftare, med lägre resursåtgång och kortare tid för planering och genomförande. Corona-pandemin har ytterligare gjort det tydligt vilka möjligheter digitaliseringen innebär för att effektivisera processer som tidigare varit inramade av tids-och rumsbegränsningar –t.ex. övning.

    Denna rapport syftar till att på ett lättillgängligt sätt redogöra för och diskutera utmaningar och möjligheter med den digitala övningsprocessen, så som den kommit till uttryck i CriseIT-projekten, genom att beskriva metodiska arbetssätt för design, genomförande och utvärdering av digitala krisövningar samt några perspektiv på implementering av digital övningsmetodik i organisationer. Målgrupp för rapporten är den som arbetar med krisberedskap i offentlig eller privat verksamhet, och som önskar lära sig mer om möjligheten att digitalisera sin övningsprocess. Arbetsrapporten är del av resultatredovisning för CriseIT2.

    Download full text (pdf)
    fulltext
  • 32.
    Magnusson, Monika
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Bellström, Peter
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Andersson, Henrik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Developing crisis training software for local governments: From user needs to generic requirements2018In: Information Systems Development: Designing Digitalization (ISD2018 Proceedings) / [ed] B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider, Lunds universiet , 2018, p. -12Conference paper (Refereed)
    Abstract [en]

    In this paper we analyze and present the generic requirements identified for a software aiming at supporting crisis management training in local governments. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. Moreover, the requirements are mapped to problems as well as opportunities. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. In our work we applied a design science approach and the artifact presented in this paper is a list of generic requirement. The presented requirements and the systems development process used, provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training

  • 33.
    Magnusson, Monika
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Bellström, Peter
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Andersson, Henrik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Developing crisis training software for local governments: From user needs to generic requirements.2019In: Advances in information systems development: Lecture Notes in Information Systems and Organisation / [ed] Andersson B., Johansson B., Barry C., Lang M., Linger H., Schneider C, Cham: Springer, 2019, p. 79-96Chapter in book (Refereed)
    Abstract [en]

    In this paper, we identify, analyze and propose generic requirements for software aiming at supporting crisis management training in local governments. The study builds on a Swedish-Norwegian R&D project based on a quadruple helix model. A design science approach was applied and the artifact presented in this paper is a list of generic requirements. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. The requirements are also mapped to the problems and opportunities identified in the project. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. The presented requirements and the systems development process that was used provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training.

  • 34.
    Molin, Lennart
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    How should interactive media be discussed for succesful requirements engineering?2003In: Perspectives on multimedia: Communication, media and information technology / [ed] Burnett, R., Brunström, A. & Nilsson, A.G, John Wiley & Sons, 2003, p. 69-96Chapter in book (Refereed)
    Abstract [en]

    Specifying requirements for a multimedia system is difficult and is often carried out in an informal way. Requirements engineering in information systems development is, on the other hand, often done in a more formal and thorough way. The chapter suggests that the difference is due to the interactive and dynamic properties of the multimedia user interface. A large proportion of the functionality has to be defined relative to the end users who are not experts in formulating system requirements. Successful multimedia requirements engineering is often characterized by close contacts between end user and developer; both parties have knowledge that needs to be shared mutually. One way to identify and formulate the requirements would be to work in a laboratory environment where end users themselves can try their ideas regarding interactive products. This is the motive for an on-going construction of a GUI experimental station reported in this chapter. The set-up is intended to admit non-programmers to test ideas for interactive products. This trial concerns educationalists focusing on persons, mainly children, suffering from various language disabilities. The aim is to facilitate manual simulations of the interactivity of teaching aids proposed by the educationalists now and in the future, thereby simplifying testing and making the development of ideas during test runs possible. The paper discusses manual simulation in relation to production of interactive teaching aids and other multimedia products.

  • 35.
    Nilsson, Anders G.
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Om metoder för systemutveckling i professionella organisationer: Karlstadskolans syn på informatikens roll i samhället2000Book (Refereed)
    Abstract [sv]

    Forskare inom informatik vid Karlstads universitet har släppt en bok: Om metoder för systemutveckling i professionella organisationer - Karlstadskolans syn på informatikens roll i samhället. Redaktörer är Anders G. Nilsson, professor i informatik vid Karlstads universitet samt John Sören Pettersson, lektor i informatik.



    Anders G. Nilsson tog initiativet till boken när han tillträdde sin professur för ett och ett halvt år sedan, förklarar John Sören Pettersson. Tanken var att boken skulle tjäna både som ett diskussionsunderlag inom vårt ämne och som en presentation av vår forskning för utomstående.

    Bokens författare har var och en skrivit om sina forskningsområden. En av dem är Lennart Molin, adjunkt och forskarstuderande.



    Vi har haft seminarier i flera omgångar där vi granskat varandras texter och föreslagit förbättringar, berättar Lennart Molin.

    I bokens 16 kapitel presenteras de områden där informatikforskningen vid Karlstads universitet ligger långt framme. Ämnena är Elektronisk affärskommunikation och tjänster, Systemutveckling för lärande organisationer, Modeller och metoder för multimediaproduktion, Standardsystem och komponentbaserade system samt Verksamhetsmodellering vid förändringsarbete.



    Boken har ambitionen att ge en lägesbild av forskningen inom informatik vid Karlstads universitet vid millennieskiftet, säger rektor Christina Ullenius. Den är också en manifestation av själva etableringen av vårt universitet och att forskarutbildning startats i Karlstad. Vi hoppas att studenter, forskare, konsulter och verksamhetsledare i professionella organisationer ska finna boken intressant. Den är också ett erbjudande till alla som vill öka sina kunskaper om vad ämnet informatik är och vilka problem som behandlas inom ämnet.



    Boken ges ut på förlaget Studentlitteratur i Lund. Den presenterades vid ett seminarium den 10 december 1999.



    I sitt inledningskapitel skriver Stig Håkangård och Anders G. Nilsson, prefekt respektive professor vid Karlstads universitet:



    "Informatik är ett expansivt kunskapsområde i dagens samhälle. Vi som kommer från Karlstadskolan anser att informatikens uppgift är att påvisa hur man med hjälp av modern informationsteknologi kan stödja operativa verksamheter, skapa nya affärsmöjligheter och bidra till en offensivare tjänsteutövning i privata företag och offentliga organisationer. Informatik är ett flervetenskapligt ämne med inslag av tekniska, ekonomiska och pedagogiska aspekter. Vi bygger på ett synsätt som kallas för användbar forskning. Detta innebär att vi kombinerar teoretisk stringens med praktisk relevans i vår forskning."



    Boken presenterar i kommande 15 kapitel forskningsverksamheten inom de fem spetsområden som finns vid informatikämnet vid Karlstad universitet:



    Elektronisk affärskommunikation och tjänster

    med kapitel av Odd Fredriksson och Marie-Therese Christiansson



    Systemutveckling för lärande organisationer

    med kapitel av Sten Carlsson, Kaisa Jansson och John Sören Pettersson



    Modeller och metoder för multimediaproduktion

    med kapitel av Louise Ulfhake, Lennart Molin och Lars-Erik Axelsson



    Standardsystem och komponentbaserade system

    med kapitel av Anders G. Nilsson, Benneth Christiansson och

    Kurt Samuelsson



    Verksamhetsmodellering vid förändringsarbete

    med kapitel av Marie-Therese Christiansson, Remigijus Gustas och Choong-ho Yi

  • 36.
    Nilsson, Anders G.
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    On Methods for Systems Development in Professional Organisations: The Karlstad university Approach to Information Systems and its Role in Society2001Book (Refereed)
    Abstract [en]

    This is explained in the initial chapter by Stig Håkangård, head of division, and Anders G. Nilsson, professor, at Karlstad University:



    "Information Systems is an expansive discipline in society today. As representatives of the Karlstad University approach we consider that the task of Information Systems is to illustrate how the use of modern information technology can support business operations; create new business opportunities and contribute to a more proactive service management in private companies and public organisations. Information Systems is a multidisciplinary subject with elements of technical, economic and pedagogical aspects. It is founded on an approach called consumable research, which means that our research is a combination of theoretical rigour and industry relevance. The challenge is to create mutual benefits to both the academic world and the business community when implementing theoretical knowledge in practice."

  • 37. Olsson, Anders
    et al.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lagringsstrategier för digital information hos svenska myndigheter och företag2001In: Tema Arkiv, nr 1 2001, sid 22-23Article in journal (Refereed)
  • 38.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 00112015In: Privacy and Identity Management for the Future Internet in the Age of Globalisation / [ed] Camenisch, Jan; Fischer-Hübner, Simone; Hansen, Marit, Springer, 2015, p. 125-135Chapter in book (Refereed)
    Abstract [en]

    We present the result of a small-scale test in which the participantsfailed to understand the graphic scheme as well as the pictographic parts of theicons appearing in the Annex to Article 13a of the European Parliament legislativeresolution of 12 March 2014 on the Proposal for a regulation of theEuropean Parliament and of the Council on the protection of individuals withregard to the processing of personal data and on the free movement of such data(General Data Protection Regulation), COM (2012) 0011.

  • 39.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT (from 2013).
    A brief evaluation of icons suggested for use in standardised information policies: Referring to the Annex in the first reading of the European Parliament on COM (2012) 00112014Report (Other academic)
    Abstract [en]

    The principle of “informed consent” as prescribed by national laws and EU directives makes it necessary to inform users about all the intended data processing when they submit data. Conveying the sometimes highly complex clauses of privacy policies to the subjects concerned is generally hard.

    This report takes a look at the icons appearing in Annex to Article 13a of the European Parliament legislative resolution of 12 March 2014 on the Proposal for a regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).  COM (2012) 11.

    In particular, the report presents the result of a small-scale test in which the participants failed to understand the graphic scheme of the proposal as well as the pictographic parts of the icons.

    Download full text (pdf)
    A brief evaluation of icons
  • 40.
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    A conceptual win‐win struggle between swiftness and formal constraints2019In: Encoding metalinguistic awareness: Ancient Mesopotamia and beyond / [ed] E. Cancik-Kirschbaum, J.C. Johnson, Gladbeck: PeWe-Verlag , 2019, 1, p. 177-194Chapter in book (Refereed)
    Abstract [en]

    In the concert of human expressions - including an individual  human’s expression - the ability to use different modalities, be they bodily based means or artefact-based expressions such as pictures, computer icons, logograms and syllabograms, there will arise needs for cross-referential expressions where one modality is used to ‘tell’ something about expressions in other modalities.

       Intentionally or unintentionally, norms for such translations will appear in the practical work of communicating  due to a need to bridge the tension inherent in paralleling different forms of expression. Metalinguistic awareness could be ascribed both to unintentional practices and to intentionally designed norms. The latter probably also rest on some unconscious presumptions (perhaps simply actions) why the concept of ‘metalinguistic awareness’ itself has to be chiseled out in the individual cases where it is used to constitute a proper characterization and a useful conceptual tool to describe advances (or changes) in metalinguistic awareness.

  • 41.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A speech-technology course for decision-makers: One of several DECIDE courses in the making1992Conference paper (Other (popular science, discussion, etc.))
    Abstract [en]

    This is a report from the making of a course on speech recognition and production within the framework of the DECIDE project of the EC programme COMETT which aims at facilitating the transfer of knowledge from university to industry

  • 42.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Avverbalisering sätter multimediautvecklarna på prov2001In: Computer SwedenArticle in journal (Other (popular science, discussion, etc.))
  • 43.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Defining the 'D' in ICT4D: Graduate Papers on Development, Globalisation, and ICT2009Collection (editor) (Other academic)
    Abstract [en]

    IPID – the International Network for Postgraduate students in ICT4D – arranged a course in the academic year 2008/2009 as a response to several requests from IPID members for an introduction to development theories and for guidance in how to define the ‘D’ in the expression ICT4D.

    The aim of the course “Development, Globalisation and ICT (Defining the ’D’ in ICT4D) – 7.5 ECTS” was thus to provide a sound foundation for advanced studies in ICT4D. The course was designed to provide insights into some of the most influential development theories. The selection was made on the basis of classical bodies of ideas with strong impact on recent notions of development.

    Devoted scholars from relevant fields were invited to lecture and comment on student papers. Postgraduate students from all over the world registered for the course. Video recording was used to provide access to the lectures for those who could not attend. In the event we have eleven completed papers, which are presented in this report.

    Download full text (pdf)
    FULLTEXT01
  • 44.
    Pettersson, John Sören
    Uppsalas universitet.
    Delimiting a Theory of Writing1998In: Language sciences (Oxford), ISSN 0388-0001, E-ISSN 1873-5746, Vol. 20, no 4, p. 415-427Article in journal (Refereed)
  • 45.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Director's introduction: The research centre HumanIT at Karlstad University2003Chapter in book (Other academic)
  • 46.
    Pettersson, John Sören
    Uppsala universitet.
    Framing the written sign1997In: Digital Creativity, ISSN 1462-6268, Vol. 8, no 2, p. 67-73Article in journal (Refereed)
    Abstract [en]

    This paper concerns certain aspects of writing in the computer era, aspects that are relevant to linguists but should also be of interest to people working with computer graphis and the human-computer interface. Technology changes patterns of communication by introducing new means of communication, but it also changes our *notion* of human communication. This can be noted from the history of writing: different writings systems seem to have inspired different conceptions of human language. Here, notions of what constitutes writing and written signs will be focussed on. The paper discusses how the material properties of writing affect the pattern of communication particularly at the 'low' level where signs are recognised and processed. Special attention is given to colour and animation in texts: the possibilities provided by a computerised writing surface are contrasted with a recently proposed theory of writing where spatiality (but not visuality) and stability are seen as the primary physical factors on which writing of any sort is founded

  • 47.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    General Mock-ups (confidential PRIME deliverable)2004Report (Other academic)
    Abstract [en]

    This document reports the initial work on generic mock-ups of user interfaces for privacy-enhancing identity management systems. It describes different user interface paradigms that have been outlined as mock-ups.



    The documentation consists of a brief background and then a description of the essential features of the major mock-ups produced. Some major user interface issues, which are not dependent on the different user interface paradigms of the mock-ups, are discussed in a separate chapter. The screenshots in the Appendix document the mock-ups graphically. Comments on details are found in the figure legends of the Appendix

  • 48.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Grammatological Studies: Writing and its Relation to Speech1996Doctoral thesis, monograph (Other academic)
    Abstract [en]

    This work addresses the problem of how writing is related to speech and how our notions of language are related to writing principles such as ‘the alphabetic principle’. The target of the study is the concept of ‘phonography’ (sound-writing, sometimes called ‘glottography’). This has been used in several theoretical works on writing, often with the assumption that the existence of phonographic systems somehow proves that the purpose of writing is to represent speech. From a functional approach, that is, from a theoretical base where language (of whatever modality) is seen as crucially dependent on actual communicative events, the notion that writing is representational in nature is criticised.

     Three areas are investigated: 1. the origin of the phono+graphic type of writing (also treated are the origin of spoken language and the medium-dependency of language); 2. the relation between alphabetic writing and notions concerning the structure of language in general and of particular languages; 3. the relationship between phonographic methods of reading old scripts and the prevailing phonocentrism.

     In all three areas it is found that the possibility of indicating pronunciation of written texts by phonographic means has been overinterpretated in favour of the prevalent representational view. The investigations conducted here present new perspectives on how phonography is to be understood in that they demonstrate how it has contributed to the development of the means for human expression, to the historical development of writing systems, to the historical development of concepts about language.

    Download full text (pdf)
    Diss_Pettersson_96
  • 49.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Gränssnittet mellan tal och skrift och mellan människa och dator2001Conference paper (Other (popular science, discussion, etc.))
  • 50.
    Pettersson, John Sören
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    HCI guidance and proposals2005Report (Refereed)
    Abstract [en]

    This document gives guidance and makes proposals on user interfaces (UI) of the PRIME integrated identity management prototype, especially the demonstrator version 1. It gives answers to unresolved problems as pointed out in the evaluations of the early user-side UI proposals, and it discusses HCI privacy design in general but also presents some specific directions for the V1 demonstrator to give the PRIME components a coherent look. Ontologies and directions for Application Programming Interface for human-computer interaction are given to guide work on the PRIME console

12 1 - 50 of 100
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf