Change search
Refine search result
12131415161718 701 - 750 of 1658
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 701.
    Issa, Mubdir
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Performance Impact of Migrating a Mining Traffic Management System To Docker2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Software deployment is all of the activities that make a software system available for use. An examaple of such activites can be installations, updating and removing of software. Each deployment platform can differ in quality attributes such as performance, maintainability, etc. Docker, a deployment platform using container technology offering a more modular way of deployment has become increasingly popular over the past few years. The aim of the project is to find out how a deployment with Docker would affect the performance of a client­server application from the mining industry. Three scenarios were performed in a simulated environment for the existing as well as the potential deployment platform. Measures of round­trip time were made for both sets of the scenarios. Results show a general decrease in performance when running the application on Docker. This is especially seen in early stages of each scenario, where Docker in average has 15 times higher round­trip times than the existing platform. However, results gathered from each scenario suggests that while Docker does start much slower than the existing platform, in later stages of each scenarios, Docker manages to narrow the gap and be at most 1.14 times higher than the existing platform. In conclusion, while the deployment in which the existing platform is deployed on does out perform Docker, it still shows some promise and could potentially be a worthy option to look at for further work.

    Download full text (pdf)
    fulltext
  • 702.
    Ivarsson, Mattias
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lindström, Alexander
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Raydio: Grafisk radiovågssimulering med strålspårning2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The 5th generation mobile network, which has promised an increase in accessibility compared to its predecessors, is currently in a global launch phase. The launch of the 5G network is intended to open up the possibility of a whole range of new areas of use. Among those are IoT and critical communication in areas such as medical processesand self-driving cars for which accessibility will be an important factor. A relatively common problem that can occur with wireless connection are black spots, which are areas with very low or no signal level. Raydio (as the project is called) is based on using a relatively new technology to be able to create an aid that can be used to evaluate the availability of radio waves for the 5th generation mobile network. The technology to be used is real-time ray tracing. Ray tracing technology will be used to simulate radiowaves in a graphical environment in order to find areas that lacks signal coverage in order to be able to provide a graphical representation of how it could be remedied. The result of the project is a proof of concept using ray tracing in the game engine Unity by using the NVIDIA OptiX ray tracing API, where a basic implementation of a plugin has been designed.

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 703.
    Iwaya, L H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fausto, Giunchiglia
    Trento University, Italy.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hume, Alethia
    Trento University, Italy.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Chenu-Abente, Ronald
    Trento University, Italy.
    Ontology-based Obfuscation and Anonymisation for Privacy: A Case Study on Healthcare2016In: Privacy and Identity Management: Time for a Revolution? / [ed] David Aspinal, Marit Hansen, Jan Camenisch, Simone Fischer-Hübner, Charles Raab, Springer, 2016, p. 343-358Conference paper (Refereed)
    Abstract [en]

    Healthcare Information Systems typically fall into the group of systems in which the need of data sharing conflicts with the privacy. A myriad of these systems have to, however, constantly communicate among each other. One of the ways to address the dilemma between data sharing and privacy is to use data obfuscation by lowering data accuracy to guarantee patient’s privacy while retaining its usefulness. Even though many obfuscation methods are able to handle numerical values, the obfuscation of non-numerical values (e.g., textual information) is not as trivial, yet extremely important to preserve data utility along the process. In this paper, we preliminary investigate how to exploit ontologies to create obfuscation mechanism for releasing personal and electronic health records (PHR and EHR) to selected audiences with different degrees of obfuscation. Data minimisation and access control should be supported to enforce different actors, e.g., doctors, nurses and managers, will get access to no more information than needed for their tasks. Besides that, ontology-based obfuscation can also be used for the particular case of data anonymisation. In such case, the obfuscation has to comply with a specific criteria to provide anonymity, so that the data set could be safely released. This research contributes to: state the problems in the area; review related privacy and data protection legal requirements; discuss ontology-based obfuscation and anonymisation methods; and define relevant healthcare use cases. As a result, we present the early concept of our Ontology-based Data Sharing Service (O-DSS) that enforces patient’s privacy by means of obfuscation and anonymisation functions.

  • 704.
    Iwaya, Leonardo H
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care2019Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC) – primary care outside the health facility into people’s homes. In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches for health surveys. Although MDCSs significantly improve the overall efficiency of CBPHC, existing and proposed solutions lack adequate privacy and security safeguards. In order to bridge this knowledge gap between the research areas of mHealth and privacy, the main research question of this thesis is: How to design secure and privacy-preserving systems for Mobile Health Data Collection Systems? To answer this question, the Design Method is chosen as an engineering approach to analyse and design privacy and security mechanisms for MDCSs. Among the main contributions, a comprehensive literature review of the Brazilian mHealth ecosystem is presented. This review led us to focus on MDCSs due to their impact on Brazil’s CBPHC, the Family Health Strategy programme. On the privacy engineering side, the contributions are a Privacy Impact Assessment (PIA) for the GeoHealth MDCS and three mechanisms: (a) SecourHealth, a security framework for data encryption and user authentication; (b) an Ontology-based Data Sharing System (O-DSS) that provides obfuscation and anonymisation functions; and, (c) an electronic consent (e-Consent) tool for obtaining and handling informed consent. Additionally, practical experience is shared about designing a MDCS, GeoHealth, and deploying it in a large-scale experimental study. In conclusion, the contributions of this thesis offer guidance to mHealth practitioners, encouraging them to adopt the principles of privacy by design and by default in their projects.

    Download full text (pdf)
    fulltext_KAPPAN
    Download (jpg)
    preview image
  • 705.
    Iwaya, Leonardo H
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems2016Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. Accidental or deliberate data breaches of health data may lead to societal pressures, embarrassment and discrimination. Information security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance. This thesis consists of publications contributing to mHealth security and privacy in various ways: with a comprehensive literature review about mHealth in Brazil; with the design of a security framework for MDCSs (SecourHealth); with the design of a MDCS (GeoHealth); with the design of Privacy Impact Assessment template for MDCSs; and with the study of ontology-based obfuscation and anonymisation functions for health data.

    Download full text (pdf)
    fulltext
    Download (jpg)
    preview image
    Download (mp3)
    Podcast
  • 706.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). The University of Adelaide, AUS; Cyber Security Cooperative Research Centre (CSCRC), AUS.
    Ahmad, Aakash
    University of Hail, SAU.
    Ali Babar, M.
    The University of Adelaide, AUS; Cyber Security Cooperative Research Centre (CSCRC), AUS.
    Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 150081-150112Article in journal (Refereed)
    Abstract [en]

    An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services. However, m/uHealth systems face significant challenges related to data security and privacy that must be addressed to increase the pervasiveness of such systems. This study aims to systematically identify, classify, compare, and evaluate state-of-the-art on security and privacy of m/uHealth systems. We conducted a systematic mapping study (SMS) based on 365 qualitatively selected studies to (i) classify the types, frequency, and demography of published research, (ii) synthesize and categorize research themes, (iii) recurring challenges, (iv) prominent solutions (i.e., research outcomes) and their (v) reported evaluations (i.e., practical validations). Results suggest that the existing research on security and privacy of m/uHealth systems primarily focuses on select group of control families (compliant with NIST800-53), protection of systems and information, access control, authentication, individual participation, and privacy authorisation. In contrast, areas of data governance, security and privacy policies, and program management are under-represented, although these are critical to most of the organizations that employ m/uHealth systems. Most research proposes new solutions with limited validation, reflecting a lack of evaluation of security and privacy of m/uHealth in the real world. Empirical research, development, and validation of m/uHealth security and privacy is still incipient, which may discourage practitioners from readily adopting solutions from the literature. This SMS facilitates knowledge transfer, enabling researchers and practitioners to engineer security and privacy for emerging and next generation of m/uHealth systems.

    Download full text (pdf)
    fulltext
  • 707.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). The University of Adelaide, AUS; Cyber Security Cooperative Research Centre (CSCRC), AUS.
    Babar, M. Ali
    The University of Adelaide, AUS; Cyber Security Cooperative Research Centre (CSCRC), AUS.
    Rashid, Awais
    University of Bristol, GBR; REPHRAIN: National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online, GBR.
    Wijayarathna, Chamila
    The University of Adelaide, AUS; Cyber Security Cooperative Research Centre (CSCRC), AUS.
    On the privacy of mental health apps: An empirical investigation and its implications for app development2023In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 28, no 1, article id 2Article in journal (Refereed)
    Abstract [en]

    An increasing number of mental health services are now offered through mobile health (mHealth) systems, such as in mobile applications (apps). Although there is an unprecedented growth in the adoption of mental health services, partly due to the COVID-19 pandemic, concerns about data privacy risks due to security breaches are also increasing. Whilst some studies have analyzed mHealth apps from different angles, including security, there is relatively little evidence for data privacy issues that may exist in mHealth apps used for mental health services, whose recipients can be particularly vulnerable. This paper reports an empirical study aimed at systematically identifying and understanding data privacy incorporated in mental health apps. We analyzed 27 top-ranked mental health apps from Google Play Store. Our methodology enabled us to perform an in-depth privacy analysis of the apps, covering static and dynamic analysis, data sharing behaviour, server-side tests, privacy impact assessment requests, and privacy policy evaluation. Furthermore, we mapped the findings to the LINDDUN threat taxonomy, describing how threats manifest on the studied apps. The findings reveal important data privacy issues such as unnecessary permissions, insecure cryptography implementations, and leaks of personal data and credentials in logs and web requests. There is also a high risk of user profiling as the apps’ development do not provide foolproof mechanisms against linkability, detectability and identifiability. Data sharing among 3rd-parties and advertisers in the current apps’ ecosystem aggravates this situation. Based on the empirical findings of this study, we provide recommendations to be considered by different stakeholders of mHealth apps in general and apps developers in particular. We conclude that while developers ought to be more knowledgeable in considering and addressing privacy issues, users and health professionals can also play a role by demanding privacy-friendly apps. 

    Download full text (pdf)
    fulltext
  • 708.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). the University of Adelaide, Australia; Cyber Security Cooperative Research Centre (CSCRC), Australia.
    Babar, Muhammad Ali
    the University of Adelaide, Australia; Cyber Security Cooperative Research Centre (CSCRC), Australia.
    Rashid, Awais
    University of Bristol, U.K.; REPHRAIN: National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online, U.K..
    Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Aspects, and Current Practices2023In: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520, Vol. 49, no 9, p. 4324-4348Article in journal (Refereed)
    Abstract [en]

    Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems. For that, software practitioners and other stakeholders in software companies need to work cooperatively toward building privacy-preserving businesses and engineering solutions. Significant research has been done to understand the software practitioners' perceptions of information privacy, but more emphasis should be given to the uptake of concrete privacy engineering components. This research delves into the software practitioners' perspectives and mindset, organisational aspects, and current practices on privacy and its engineering processes. A total of 30 practitioners from nine countries and backgrounds were interviewed, sharing their experiences and voicing their opinions on a broad range of privacy topics. The thematic analysis methodology was adopted to code the interview data qualitatively and construct a rich and nuanced thematic framework. As a result, we identified three critical interconnected themes that compose our thematic framework for privacy engineering “in the wild”: (1) personal privacy mindset and stance, categorised into practitioners' privacy knowledge, attitudes and behaviours; (2) organisational privacy aspects, such as decision-power and positive and negative examples of privacy climate; and, (3) privacy engineering practices, such as procedures and controls concretely used in the industry. Among the main findings, this study provides many insights about the state-of-the-practice of privacy engineering, pointing to a positive influence of privacy laws (e.g., EU General Data Protection Regulation) on practitioners' behaviours and organisations' cultures. Aspects such as organisational privacy culture and climate were also confirmed to have a powerful influence on the practitioners' privacy behaviours. A conducive environment for privacy engineering needs to be created, aligning the privacy values of practitioners and their organisations, with particular attention to the leaders and top management's commitment to privacy. Organisations can also facilitate education and awareness training for software practitioners on existing privacy engineering theories, methods and tools that have already been proven effective.

    Download full text (pdf)
    fulltext
  • 709.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Åhlfeldt, Rose-Mharie
    School of Informatics, University of Skövde, Skövde, Sweden.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems2018In: 2018 IEEE 31st International Symposium on Computer-Based Medical Systems / [ed] Hollmen, J; McGregor, C; Soda, P; Kane, B, IEEE, 2018, p. 42-47Conference paper (Refereed)
    Abstract [en]

    Community Health Workers (CHWs) have been using Mobile Health Data Collection Systems (MDCSs) for supporting the delivery of primary healthcare and carrying out public health surveys, feeding national-level databases with families’ personal data. Such systems are used for public surveillance and to manage sensitive data (i.e., health data), so addressing the privacy issues is crucial for successfully deploying MDCSs. In this paper we present a comprehensive privacy threat analysis for MDCSs, discuss the privacy challenges and provide recommendations that are specially useful to health managers and developers. We ground our analysis on a large-scale MDCS used for primary care (GeoHealth) and a well-known Privacy Impact Assessment (PIA) methodology. The threat analysis is based on a compilation of relevant privacy threats from the literature as well as brain-storming sessions with privacy and security experts. Among the main findings, we observe that existing MDCSs do not employ adequate controls for achieving transparency and interveinability. Thus, threatening fundamental privacy principles regarded as data quality, right to access and right to object. Furthermore, it is noticeable that although there has been significant research to deal with data security issues, the attention with privacy in its multiple dimensions is prominently lacking.

  • 710.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Åhlfeldt, Rose-Mharie
    University of Skövde.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats2019In: JMIR mhealth and uhealth, E-ISSN 2291-5222, Vol. 7, no 3, p. 1-16, article id e11642Article in journal (Refereed)
    Abstract [en]

    Background: Community-based primary care focuses on health promotion, awareness raising, and illnesses treatment and prevention in individuals, groups, and communities. Community Health Workers (CHWs) are the leading actors in such programs, helping to bridge the gap between the population and the health system. Many mobile health (mHealth) initiatives have been undertaken to empower CHWs and improve the data collection process in the primary care, replacing archaic paper-based approaches. A special category of mHealth apps, known as mHealth Data Collection Systems (MDCSs), is often used for such tasks. These systems process highly sensitive personal health data of entire communities so that a careful consideration about privacy is paramount for any successful deployment. However, the mHealth literature still lacks methodologically rigorous analyses for privacy and data protection.

    Objective: In this paper, a Privacy Impact Assessment (PIA) for MDCSs is presented, providing a systematic identification and evaluation of potential privacy risks, particularly emphasizing controls and mitigation strategies to handle negative privacy impacts.

    Methods: The privacy analysis follows a systematic methodology for PIAs. As a case study, we adopt the GeoHealth system, a large-scale MDCS used by CHWs in the Family Health Strategy, the Brazilian program for delivering community-based primary care. All the PIA steps were taken on the basis of discussions among the researchers (privacy and security experts). The identification of threats and controls was decided particularly on the basis of literature reviews and working group meetings among the group. Moreover, we also received feedback from specialists in primary care and software developers of other similar MDCSs in Brazil.

    Results: The GeoHealth PIA is based on 8 Privacy Principles and 26 Privacy Targets derived from the European General Data Protection Regulation. Associated with that, 22 threat groups with a total of 97 subthreats and 41 recommended controls were identified. Among the main findings, we observed that privacy principles can be enhanced on existing MDCSs with controls for managing consent, transparency, intervenability, and data minimization.

    Conclusions: Although there has been significant research that deals with data security issues, attention to privacy in its multiple dimensions is still lacking for MDCSs in general. New systems have the opportunity to incorporate privacy and data protection by design. Existing systems will have to address their privacy issues to comply with new and upcoming data protection regulations. However, further research is still needed to identify feasible and cost-effective solutions.

    Download full text (pdf)
    fulltext
  • 711.
    Iwaya, Leonardo H.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Åhlfeldt, Rose-Mharie
    School of Informatics, University of Skövde, Skövde, Sweden.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Overview of Privacy Challenges in Mobile Health Data Collection Systems2018Conference paper (Refereed)
    Abstract [en]

    Community Health Workers (CHWs) have been using Mobile HealthData Collection Systems (MDCSs) for public health surveys, feeding the national-level databases with the families’ personal data. Since such systems are inherentlyused for public surveillance and manage sensitive data (i.e., health data), deal-ing with the privacy issues is crucial to successful deployments. In this poster wepresent the privacy challenges related to MDCSs, providing a summary speciallyimportant to health managers and developers.

    Download full text (pdf)
    fulltext
  • 712.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Federal University of Santa Catarina, Brazil.
    Iwaya, Gabriel Horn
    Federal University of Santa Catarina, Brazil.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Steil, Andrea Valeria
    Federal University of Santa Catarina, Brazil.
    Organisational Privacy Culture and Climate: A Scoping Review2022In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 73907-73930Article, review/survey (Refereed)
    Abstract [en]

    New regulations worldwide are increasingly pressing organisations to review how they collect and process personal data to ensure the protection of individual privacy rights. This organisational transformation involves implementing several privacy practices (e.g., privacy policies, governance frameworks, and privacy-by-design methods) across multiple departments. The literature points to a strong influence of the organisations’ culture and climate in implementing such privacy practices, depending on how leaders and employees perceive and address privacy concerns. However, this new hybrid topic referred to as Organisational Privacy Culture and Climate (OPCC), remains poorly demarcated and weakly defined. In this paper, we report a Scoping Review (ScR) on the topic of OPCC to systematically identify and map studies, contributing with a synthesis of the existing work, distinguishing core and adjacent publications, research gaps, and pathways of future research. This ScR includes 36 studies categorised according to their demographics, research types, contribution types, research designs, proposed definitions, and conceptualisations. Also, 18 studies categorised as primary research were critically appraised, assessing the studies’ methodological quality and credibility of the evidence. Although published research has significantly advanced the topic of OPCC, more research is still needed. Our findings show that the topic is still in its embryonic stage. The theory behind OPCC has not yet been fully articulated, even though some definitions have been independently proposed. Only one measuring instrument for privacy culture was identified, but it needs to be further developed in terms of identifying and analysing its factors, and evaluating its validity and reliability. Initiatives of future research in OPCC will require interdisciplinary research efforts and close cooperation with industry to further propose and rigorously evaluate instruments. Only then OPCC would be considered an evidence-based research topic that can be reliably used to evaluate, measure, and embed privacy in organisations.

    Download full text (pdf)
    fulltext
  • 713.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Li, Jane
    Health and Biosecurity, Commonwealth Scientific and Industrial Research Organization, Australia.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Åhlfeldt, Rose-Mharie
    University of Skövde.
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance2019In: MEDINFO 2019: Health and Wellbeing e-Networks for All / [ed] Lucila Ohno-Machado, Brigitte Séroussi, IOS Press, 2019, Vol. 264, p. 1224-1227Conference paper (Refereed)
    Abstract [en]

    Community health workers in primary care programs increasingly use Mobile Health Data Collection Systems (MDCSs) to report their activities and conduct health surveys, replacing paper-based approaches. The mHealth systems are inherently privacy invasive, thus informing individuals and obtaining their consent is important to protect their right to privacy. In this paper, we introduce an e-Consent tool tailored for MDCSs. It is developed based on the requirement analysis of consent management for data privacy and built upon the solutions of Participant-Centered Consent toolkit and Consent Receipt specification. The e-Consent solution has been evaluated in a usability study. The study results show that the design is useful for informing individuals on the nature of data processing, privacy and protection and allowing them to make informed decisions

  • 714.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Towards a Privacy Impact Assessment Template for Mobile Health Data Collection Systems2016In: Proceedings of the 5th International Conference on M4D Mobile Communication Technology for Development: M4D 2016, General Tracks / [ed] Orlando P Zacarias and Caroline W. Larsson, 2016, p. 189-200Conference paper (Refereed)
    Download full text (pdf)
    Iwaya_et_al_2016
  • 715.
    Iwaya, Leonardo H
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Nordin, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Health Sciences (from 2013). Karlstad University, Faculty of Social and Life Sciences, Department of Nursing.
    Fritsch, Lothar
    Oslo Metropolitan University, Norway.
    Børøsund, Elin
    Oslo University Hospital, Norway.
    Johansson, Margareta
    Uppsala University, Sweden.
    Varsi, Cecilie
    Oslo University Hospital, Norway.
    Ängeby, Karin
    Region Värmland, Sweden.
    Early Labour App: Developing a practice-based mobile health application for digital early labour support2023In: International Journal of Medical Informatics, ISSN 1386-5056, E-ISSN 1872-8243, Vol. 177, p. 105139-105139, article id 105139Article in journal (Refereed)
    Abstract [en]

    Background: Pregnant women in early labour have felt excluded from professional care, and their partners have been restricted from being involved in the birthing process. Expectant parents must be better prepared to deal with fear and stress during early labour. There is a need for evidence-based information and digital applications that can empower couples during childbirth. Objective: To develop and identify requirements for a practice-based mobile health (mHealth) application for Digital Early Labour Support. Methods: This research started with creating an expert group composed of a multidisciplinary team capable of informing the app development process on evidence-based practices. In consultation with the expert group, the app was built using an agile development approach (i.e., Scrum) within a continuous software engineering setting (i.e., CI/CD, DevOps), also including user and security tests. Results: During the development of the Early Labour App, two main types of challenges emerged: (1) user challenges, related to understanding the users’ needs and experience with the app, and (2) team challenges, related to the software development team in particular, and the necessary skills for translating an early labour intervention into a digital solution. This study reaffirms the importance of midwife support via blended care and the opportunity of complementing it with an app. The Early Labour App was easy to use, the women needed little to no help, and the partner’s preparation was facilitated. The combination of the app together with blended care opens up awareness, thoughts and feelings about the method and provides good preparation for the birth. Conclusion: We propose the creation of the Early Labour App, a mHealth app for early labour support. The preliminary tests conducted for the Early Labour App show that the app is mature, allowing it to be used in the project’s Randomised Control Trial, which is already ongoing.

    Download full text (pdf)
    fulltext
  • 716.
    Iwaya, Leonardo H.
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Voronkov, Artem
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Martucci, Leonardo A.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Firewall Usability and Visualization: A Systematic Literature Review2016Report (Refereed)
    Abstract [en]

    Firewalls are network security components that allow administrators to handle incoming and outgoing traffic based on a set of rules. Such security appliances are typically the first line of defense, creating a barrier between organization’s internal network and the outside network (e.g., Internet). The process of correctly configuring a firewall is complex and error prone, and it only gets worse as the complexity of the network grows. A vulnerable firewall configuration will very likely result in major threats to the organization’s security. In this report we aim to investigate how to make administrator task of planning and implementing firewall solutions easier, from the stand points of usability and visualization. Our scientific investigation starts with the understanding of the state-of-the-art on this specific field. To do so, we conducted a Systematic Literature Review (SLR), a strict methodology to plan a literature review, to gather relevant information, to synthesize and compare approaches, and to report findings. During the initial search process thousands of papers were screened, leading us to 125 papers carefully selected for further readings. In the secondary study, ten relevant works were identified and assessed, in which authors tackled the issues of usability and visualization for Firewalls and Personal Firewalls. Among the main findings, we perceive that there is a lack (or even absence) of user studies to validate the proposed models. This leads us to a series of unwarranted solutions, that need to be prototyped and tested with real users. We also see an huge opportunity for integrative approaches, that could combine firewall research areas, such as automatic anomaly detection, advisory systems, and varying visualization schemes.

    Download full text (pdf)
    fulltext
    Download (jpg)
    preview image
  • 717.
    Iwaya, Leonardo
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Sao Paulo, Brazil.
    Rosso, R S U
    Universidade do Estado de Santa Catarina, Brazli.
    Hounsell, M S
    Universidade do Estado de Santa Catarina, Brazil.
    A Design for Assembly Application with Dynamic Information Retrieval from Case Database2013In: Intelligent Manufacturing Systems / [ed] Marcos de Sales Guerra Tsuzuki and José Reinaldo Silva, Elsevier, 2013, Vol. 11, p. 186-191Conference paper (Refereed)
    Abstract [en]

    Design for Assembly (DFA) is a Concurrent Engineering constituent that gained a lot of attention due to fast and measurable benets. The main principle of DFA is to foresee assembly problems at the design stage based on the experience regarding functionality, materials and machine availability. The work presented in this paper, named RFA - Redesign for Assembly, adds a way to explicitly register and retrieve experiences as part of the design process. It starts from an initial design, then RFA leads the designer through a detailed assessment towards an improved design according to previous experiences. Experience representation was done using a Group Technology classication concept that helps assign a primary-key for a Case Based Teaching underlying system. A supporting system has been implemented in order to try out RFA. DFA scholars have used RFA and proved that experience retrieval is easily and intuitively incorporated in the design process. The paper presents a study about the DFA methodology, reviews existing solutions (methods and software) from the literature and details the RFA architecture, implementation and tests. RFA shows potential for a new design culture based on knowledge sharing, but also, as a repository for a very valuable asset, i.e. problem-oriented assembly-related design experience.

  • 718.
    Jain, P
    et al.
    South Asian University.
    Kanjilal, S
    South Asian University.
    Persson, Lars-Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hardy-type inequalities over balls in R^N for some bilinear and iterated operators2019In: Journal of Inequalities and Special Functions, E-ISSN 2217-4303, Vol. 10, no 2, p. 35-48Article in journal (Refereed)
    Abstract [en]

    Some new multidimensional Hardy-type inequalites are proved and discussed. The cases with bilinear and iterated operators are considered and some equivalence theorems are proved.

  • 719.
    Jakobsson, Martin
    et al.
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for the Studies of Social Sciences Didactics (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Political, Historical, Religious and Cultural Studies (from 2013).
    van Bommel, Jorryt
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Health, Science and Technology (starting 2013), Science, Mathematics and Engineering Education Research.
    Randahl, Ann-Christin
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Language, Literature and Intercultural Studies (from 2013).
    Modig, Niclas
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Political, Historical, Religious and Cultural Studies (from 2013).
    Semantiska vågor i undervisningen: Likheter och skillnader i skolämnena matematik och samhällskunskap2023In: Utbildning och lärande, ISSN 1653-0594, Vol. 17, no 2, p. 59-78Article in journal (Refereed)
    Abstract [en]

    If students are to build knowledge, it is important to connect disciplinary knowledge to students’ everyday knowledge when teaching. In this study, the relationship between disciplinary- and everyday knowledge in subject-teaching is analysed, based on the semantic dimensions used in Legitimation Code Theory. Un-packing disciplinary concepts through concrete examples implies a shift towards a context-dependent everyday knowledge, while re-packing them entails a shift towards disciplinary abstractions and context-independent generalizations. Over time these shifts constitute so-called semantic waves argued to facilitate students´ knowledge building. Earlier research suggest that the form of these semantic waves can differ between school-subjects. Therefore, this article examines semantic waves in two contrasting subjects – Mathematics and Social Science Education, aiming at a better understanding of how and why semantic waves differ. The results reveal that the forms of semantic waves differ between the two subjects. In Mathematics, when teaching different geometrical concepts, the semantic shifts through un-packing and re-packing were frequent and evenly distributed. When teaching about pricing and household in Social Science, un-packing activities dominated, making shifts biased towards everyday knowledge. These differences are discussed in terms of semantic waves constituting a different pulse when making knowledge-building possible in Mathematics and Social Science.

    Download full text (pdf)
    fulltext
  • 720.
    Jalal, Laoa
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Using Synthetic Data to ModelMobile User Interface Interactions2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Usability testing within User Interface (UI) is a central part of assuring high-quality UIdesign that provides good user-experiences across multiple user-groups. The processof usability testing often times requires extensive collection of user feedback, preferablyacross multiple user groups, to ensure an unbiased observation of the potential designflaws within the UI design. Attaining feedback from certain user groups has shown tobe challenging, due to factors such as medical conditions that limits the possibilities ofusers to participate in the usability test. An absence of these hard-to-access groups canlead to designs that fails to consider their unique needs and preferences, which maypotentially result in a worse user experience for these individuals. In this thesis, wetry to address the current gaps within data collection of usability tests by investigatingwhether the Generative Adversarial Network (GAN) framework can be used to generatehigh-quality synthetic user interactions of a particular UI gesture across multiple usergroups. Moreover, a collection UI interaction of 2 user groups, namely the elderlyand young population, was conducted where the UI interaction at focus was thedrag-and-drop operation. The datasets, comprising of both user groups were trainedon separate GANs, both using the doppelGANger architecture, and the generatedsynthetic data were evaluated based on its diversity, how well temporal correlations arepreserved and its performance compared to the real data when used in a classificationtask. The experiment result shows that both GANs produces high-quality syntheticresemblances of the drag-and-drop operation, where the synthetic samples show bothdiversity and uniqueness when compared to the actual dataset. The synthetic datasetacross both user groups also provides similar statistical properties within the originaldataset, such as the per-sample length distribution and the temporal correlationswithin the sequences. Furthermore, the synthetic dataset shows, on average, similarperformance achievements across precision, recall and F1 scores compared to theactual dataset when used to train a classifier to distinguish between the elderly andyounger population drag-and-drop sequences. Further research regarding the use ofmultiple UI gestures, using a single GAN to generate UI interactions across multipleuser groups, and performing a comparative study of different GAN architectures wouldprovide valuable insights of unexplored potentials and possible limitations within thisparticular problem domain.

    Download full text (pdf)
    fulltext
  • 721.
    Jalili, Leilia
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Parichehreh, Ali
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Efficient traffic offloading for seamless connectivity in 5G networks onboard high speed trains2017In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, IEEE, 2017, p. 1-6Conference paper (Refereed)
    Abstract [en]

    Seamless wireless connectivity in high mobility scenarios (≥ 300 km/h), is one of the fundamental key requirements for the future 5G networks. High speed train (HST) is one of the preferred mid-range transportation systems, and highlights the challenges of providing wireless connectivity in high mobility scenarios for the 5G networks. Advanced version of Long Term Evolution (LTE-A) from the Third Generation Partnership Project (3GPP) with peak data rate up to 100 Mbps in high mobility scenarios paved the road toward high quality and cost effective onboard Internet in HSTs. However, frequent handovers (HO) of large number of onboard users increase the service interruptions that in turn inevitably decrease the experienced quality of service (QoS). In this paper, according to the two-tier architecture of the HST wireless connectivity, we propose a novel and practically viable onboard traffic offloading mechanism among the HST carriages that effectively mitigates the service interruptions caused by frequent HOs of massive number of onboard users. The proposed architecture does not imply any change on the LTE network standardization. Conclusions are supported by numerical results for realistic LTE parameters and current HST settings.

  • 722.
    Jankvist, Uffe
    et al.
    University of Southern Denmark.
    Ryve, Andreas
    Mälardalen University.
    van Bommel, Jorryt
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Waege, Kjersti
    Norvegian University of Science and Technology.
    Future challenges of mathematics education research in the Nordic region: Young researchers’ perspective2011In: Proceedings of NORMA 11: the sixth Nordic Conference on Mathmatics Education / [ed] Guðný Helga Gunnarsdóttir, Reijkjavik: University of Iceland Press, 2011Conference paper (Refereed)
    Abstract [en]

     In the last decade research in mathematics education has grown and consolidated in the Nordic countries. New and younger researchers are entering the field as a result of the organization of solid doctoral programs and the growth of teaching and research environments in higher education institutions. The social, cultural and economic contexts of our countries have also changed in the last decade. The question of which are the main challenges for research in the years to come is worth exploring for a community starting a new decade of work. The intention of the panel is to generate a discussion in the community by having young researchers present their views on: (1) which topics of research the Nordic region has contributed to the world and that deserve being strengthened in the future; (2) which new topics of research that may become relevant as social changes pose new demands on our knowledge and understanding of the practices of mathematics education in the educational system; and (3) which institutional affordances and constraints young researchers experience for the development of research 

  • 723.
    Jansson, David
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Elofsson, Filip
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ramverk för utveckling av pretotyper: Framtagning av ett Azure-baserat ramverk för pretotypframställningar inom IoT2023Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Developing a new product can be time- and money-consuming. Knowing whether there is a market for the product is not always obvious. This is why pretotyping is a good idea. A pretotype tests the concept and interest in products among customers. It is therefore an advantage to be able to develop pretotypes quickly. In this essay, the question of how a framework for pretotyping can be built will be answered, as well as how a pretotype of a ”smart belt” was developed. The framework consists of three components: microcontroller, cloud services and application. Communication between microcontroller and cloud is handled with an MQTT library from Microsoft. The cloud services are based in Microsoft Azure and include IoT Hub and SQL database. The application has been developed by the supervisor from the company. The framework supports communication from device to application and application to device.

    Download full text (pdf)
    fulltext
  • 724.
    Jarzębowicz, Aleksander
    et al.
    Gdańsk University of Technology, Poland.
    Luković, Ivan
    University of Belgrade, Serbia.
    Przybyłek, Adam
    Gdańsk University of Technology, Poland.
    Staroń, Mirosław
    University of Gothenburg, Sweden.
    Ahmad, Muhammad Ovais
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ochodek, Mirosław
    Poznan University of Technology, Poland.
    Preface2024In: Conference proceedings-Software, System, and Service Engineering / [ed] Aleksander Jarzębowicz, Ivan Luković, Adam Przybyłek, Mirosław Staroń, Muhammad Ovais Ahmad, Mirosław Ochodek, Springer, 2024, Vol. 499, p. v-viConference paper (Other academic)
  • 725.
    Jibran, Muhammad Ali
    et al.
    Jeju National University, KOR.
    Abbas, Muhammad Tahir
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rafiq, Adeel
    Jeju National University, KOR.
    Song, Wang-Cheol
    Jeju National University, KOR.
    Position prediction for routing in software defined internet of vehicles2020In: Journal of Communications, ISSN 1796-2021, E-ISSN 2374-4367, Vol. 15, no 2, p. 157-163Article in journal (Refereed)
    Abstract [en]

    By the prediction of future location for a vehicle in Internet of Vehicles (IoV), data forwarding schemes can be further improved. Major parameters for vehicle position prediction includes traffic density, motion, road conditions, and vehicle current position. In this paper, therefore, our proposed system enforces the accurate prediction with the help of real-time traffic from the vehicles. In addition, the proposed Neural Network Model assists Edge Controller and centralized controller to compute and predict vehicle future position inside and outside of the vicinity, respectively. Last but not least, in order to get real-time data, and to maintain a quality of experience, the edge controller is explored with Software Defined Internet of Vehicles. In order to evaluate our framework, SUMO simulator with Open Street map is considered and the results prove the importance of vehicle position prediction for vehicular networks.

    Download full text (pdf)
    fulltext
  • 726.
    Johan, Pedersen
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rebecka, Alfredsson
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Prognostisering med hjälp av maskininlärning2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Machine learning is a topic that is being used in more areas. More companies want to take advantage of this to be able to improve their sales models. The aim of the project was to develop a forecasting tool as this could result in a possible increased profit for the customer. Forecasting takes place at the Amount data point using the two machine learning models random decision tree and recurrent neural network. The random decision tree model only predicts the data point while the recurrent neural network model predicts the data point with the account of L.

    The data was investigated with the exploratory data analysis model to investigate relationships, find anomalies and designate data points, and then be used in the machine learning models. The result of the work is that the two models achieve an average error for forecasting that is within the client’s acceptable limits.

    Download full text (pdf)
    fulltext
  • 727.
    Johansen, J.
    et al.
    University of Oslo.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Making GDPR usable: A model to support usability evaluations of privacy2020In: IFIP Advances in Information and Communication Technology, Springer, 2020, p. 275-291Conference paper (Refereed)
    Abstract [en]

    We introduce a new model for evaluating privacy that builds on the criteria proposed by the EuroPriSe certification scheme by adding usability criteria. Our model is visually represented through a cube, called Usable Privacy Cube (or UP Cube), where each of its three axes of variability captures, respectively: rights of the data subjects, privacy principles, and usable privacy criteria. We slightly reorganize the criteria of EuroPriSe to fit with the UP Cube model, i.e., we show how EuroPriSe can be viewed as a combination of only rights and principles, forming the two axes at the basis of our UP Cube. In this way we also want to bring out two perspectives on privacy: that of the data subjects and, respectively, that of the controllers/processors. We define usable privacy criteria based on usability goals that we have extracted from the whole text of the General Data Protection Regulation. The criteria are designed to produce measurements of the level of usability with which the goals are reached. Precisely, we measure effectiveness, efficiency, and satisfaction, considering both the objective and the perceived usability outcomes, producing measures of accuracy and completeness, of resource utilization (e.g., time, effort, financial), and measures resulting from satisfaction scales. In the long run, the UP Cube is meant to be the model behind a new certification methodology capable of evaluating the usability of privacy, to the benefit of common users. For industries, considering also the usability of privacy would allow for greater business differentiation, beyond GDPR compliance.

  • 728.
    Johansen, Johanna
    et al.
    Oslo University; NOR.
    Pedersen, Tore
    Oslo New University College, NOR ; Norwegian Intelligence School, NOR.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Johansen, Christian
    Norwegian University of Science & Technology, NOR.
    Schneider, Gerardo
    University of Gothenburg.
    Roosendaal, Arnold
    Privacy Co, NLD.
    Zwingelberg, Harald
    Unabhangiges Landeszentrum Datenschutz Schleswig, DEU.
    Sivesind, Anders Jakob
    Oslo University, NOR.
    Noll, Josef
    Oslo University, NOR.
    A multidisciplinary definition of privacy labels2022In: Information and Computer Security, E-ISSN 2056-4961, Vol. 30, no 3, p. 452-469Article in journal (Refereed)
    Abstract [en]

    Purpose This paper aims to present arguments about how a complex concept of privacy labeling can be a solution to the current state of privacy. Design/methodology/approach The authors give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives: Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological and Multidisciplinary. They describe a common vision, proposing several important "traits of character" of PL as well as identifying "undeveloped potentialities", i.e. open problems on which the community can focus. Findings This position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like to address these needs. Main aspects considered are the PL's educational power to change people's knowledge of privacy, tools useful for constructing PL and the possible visual appearances of PL. They also identify how the present landscape of privacy certifications could be improved by PL. Originality/value The authors adopt a multidisciplinary approach to defining PL as well as give guidelines in the form of goals, characteristics, open problems, starting points and a roadmap for creating the ideal PL.

  • 729.
    Johansson, Anton
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Stenzelius, Kalle
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Portning av ett Linuxbaserat system2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The project is about embedded systems in self-driving vehicles which is a growing andcurrent area. This is important as the automation of vehicles can make different sectorssuch as the mining and logistics industry more effective. This work relates to the topicas it aims to improve part of the self-driving software stack by replacing Ubuntu with aless resource-intensive Linux based system. The main goal of this work is to implementand document improvements. The work contains a research part where advantages anddisadvantages are compared against each other, followed by an implementation thatiteratively solved one problem at a time.The result became instructions and documentation describing the choices madefor a less resource demanding Linux based system. It also includes instructions anddocumentation for two different application that are part of the software stack.

    Download full text (pdf)
    fulltext.pdf
    Download full text (pdf)
    Arkivfil
  • 730.
    Johansson, Christoffer
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Magnusson, Marcus
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Algebra för matematiskt begåvade elever i årskurs 5: En intervjustudie2023Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    According to the School Act, all students have the right to the guidance and stimulation they need to develop to the best of their abilities based on their individual conditions. For this reason, we want to investigate through this study how algebraic tasks and teaching within algebra can be adapted to provide mathematically gifted students with the challenge and stimulation they need to develop to the fullest extent possible. This has been examined by conducting a series of lessons consisting of three class sessions. After the lesson series concluded, semi-structured interviews were conducted in focus groups with the participating pupils to explore what is required for algebraic tasks and algebraic teaching to be perceived as challenging and stimulating by fifth-grade students. The theory used to analyze the results is positioning theory. The most important findings that have emerged are that these pupils should be offered the opportunity to work with challenging tasks, preferably by allowing them to work with these tasks in pairs/groups with other students at a similar level of knowledge.

    Download full text (pdf)
    fulltext
  • 731.
    Johansson, David
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Construction of Superimposed Codes Using Graphs and Galois Fields2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    In this thesis some constructions of superimposed codes are presented. Many of the known nontrivial constructions arise from t−designs, and the constructions discussed in this thesis is also based on a block design idea. Superimposed codes are rather combinatorial in nature, so the connection to t−designs is not too surprising. What may be a little surprise, however, is the connection between superimposed codes and linear codes and Galois elds. Linear codes are quite intuitive and have nice properties, as is the case for Galois elds; combinatorial structures are quite often the contrary, not intuitive and quite dicult to understand. Because of this, it is interesting that a combinatorial structure like superimposed codes can be constructed from structures like linear codes and Galois elds. The main goal of this thesis is to present two possibly new approaches to construct superimposed codes. The constructions are described, but not proved to be correct. The rst construction presented is using graphs. In practice, this is not a good way to construct codes, since it requires the construction of a graph and nding certain cycles in the graph. It is still an interesting construction, however, since it provides a connection between constant weight codes and superimposed codes. Another construction is presented, one that seems much more useful when constructing codes. In [7] one particular superimposed code is constructed from a Galois eld. In this thesis we will see that this construction using Galois elds can be generalized.

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 732.
    Johansson, David
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    On the Energy Cost of Robustness and Resiliency for Virtual Network Function Placement2018In: 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE, 2018Conference paper (Refereed)
    Abstract [en]

    The placement of Virtual Network Functions (VNF) in distributed data centers is an important problem to solve for the next generation cloud based telecom architectures. This is because where to place the VNFs and how to route the traffic in the physical network impacts the energy consumption of the cloud infrastructure, the resiliency of the service chains and the SLA with the tenants. For network operators, it is important to minimize the operational costs of their infrastructure, provide robustness of the placement and routing in order to cope with potential hardware failures and imprecise resource demand specifications. In this paper, we develop a new optimization model for the green multi-period VNF placement and traffic routing problem, where different service chain configurations exist over time. The model is formulated as a Mixed Integer Linear Program (MILP), considers latency due to network propagation and VNF processing and provides different protection methods for the NFV traffic routing to cope with link failures. By applying Soyster's robustness principle, the model yields a network configuration that can cope with load that deviates from the expected demand. Because the MILP is complex to solve, we develop a fast variable fixing heuristic. In our numerical evaluation, we use the virtualized Evolved Packet Core and study the energy cost of different robustness levels and protection schemes for VNF service flow routing.

  • 733.
    Johansson, Gustav
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Persson, Fredrik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Photograph labeling application: An Android application for labeling and uploading of photographs2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The project’s goal was to solve a technical problem for Elonservice in Värmland, wheretheir technicians have the need for an upload solution for labeled photographs in connectionwith warranty claims. The solution to the problem was to develop an Android applicationthat label photographs and then automatically uploads them to a selected storage service.The end result of the project is a working Android application. Users can take photographsthrough the application and is then forced to name them in a correct manner. Theapplication automatically handles the uploading of photographs and deletion of uploadedphotographs. In addition to this there is also a gallery where all photographs are displayedwith their upload state and the opportunity to see all photos in full screen. The applicationhas future development possibilities such as more options for storage services , labelingalternative to photographs and a more attractive design.

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 734.
    Johansson, Josefine
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hämquist, Emelie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    “När jag måste upptäcka allt själv så prioriterar jag bort det”: En kvalitativ studie kring lärares självupplevda digitala kompetens och attityd gentemot digitala lärresurser i matematikundervisningen i årskurs 1–32022Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    As a consequence of society's constant digitalization, the demands for digital competence increases. The educational system is no exception, and teachers should be considered a central component regarding the integration of digital learning resources in education. Therefore, the purpose of this study is to investigate whether or not the use of digital learning resources in mathematics education in grades 1–3 is affected by the self-perceived digital competence and attitudes of teachers, and, if so, how it is affected. To fulfill this purpose a qualitative study was conducted, which included interviews with thirteen teachers working in selected grades. The results showed that each and every teacher had a positive attitude, as well as a high usage of digital learning resources in mathematics education. The results also showed that this did not automatically imply a critical approach or awareness regarding the use of these kind of resources and its effect on mathematics education. This indicates that the majority of the respondents have deficiencies regarding the ability to combine digital resources with pedagogical content knowledge when teaching mathematics.

    The conclusion of the study is that teachers’ self-perceived digital competence and attitudes affected the use of digital learning resources, and that these aspects in turn were affected by numerous other factors. The self-perceived digital competence was affected by the individual interpretation of the same notion, which in the long run seemed to affect the critical approach towards the use of digital learning resources. The factors that turned out to have the most effect on teachers’ attitudes were shortage of time and level of interest. Overall, this indicates that more time needs to be given in order for teachers to enhance their competence through education and collaboration between colleagues. This in order to prevent teachers' individual actions affecting the equivalence of education.

    Download full text (pdf)
    fulltext
  • 735.
    Johansson, Simon
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Andersson, Hugo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Chicago: A multiplayer card game based on Client – Server architecture2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    Chicago
  • 736.
    Johansson, Viktor
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Jeppesen, Christian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Utveckling av internordersystem för SharePoint2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    SharePoint is a web based platform designed to provide internal communications and file sharing for businesses and organizations.

    In this project, we created a system consisting of multiple applications to be used together with SharePoint. These applications are meant to simplify the workflow for internal orders of products. The system is targeted towards companies that do not have a flexible approach to digital orders or companies that want to integrate this functionality into their SharePoint platform.

     

    The project includes, in addition to the creation of the system, installation of the software and the servers needed to run a SharePoint environment and their configurations.

    The system consists of four applications where one of these, the store application, is required for the system to be used at all. The other applications are an order management application, a purchase application and an incoming delivery application. Of these four, we have implemented the store application and the order management application.

     

    Our hope is that users will find the system easy to use and graphically appealing.

    Download full text (pdf)
    Utveckling av internordersystem för SharePoint
    Download full text (pdf)
    Arkivfil
  • 737.
    Johnsson, Amanda
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Domanders, Moa
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Implementation av molnbaserad edge-enhetslösning för automation2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The automation industry interest in Internet of Things (IoT) and Microsoft Azure IoT Hub has increased, as it provides improvements in terms of reducing costs, increases revenue and provides efficient management of devices and machines. Prevas is a company working in this field and in this project the assignment was to look at the possibilities of improving an already existing solution they have.The aim was to set up a connection between a Programmable Logic Controller (PLC) and a Azure IoT hub and get the two components to communicate with each other. Through a simple application the PLC and the Azure IoT hub will exchange data with each other. To establish communication of results, the IoT Edge runtime has been installed to transform the Raspberry Pi into an IoT Edge device. The application was created in Node Red, where it was possible to create a connection and communication between the PLC and the Azure IoT hub. Through this application, notifications and messages can be sent between the PLC and the cloud. In the application, it is checked that a machine is working during specific times and if the machine is off when it should be running, an error message will be sent to the IoT hub. 

    Download full text (pdf)
    fulltext
    Download full text (pdf)
    Arkivfil
  • 738.
    Johnsson, John
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Pontus, Ljungdahl
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    PRIMConverter2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    primconverter
    Download full text (pdf)
    Arkivfil
  • 739.
    Jonsson, Bert
    et al.
    Umeå universitet.
    Norqvist, Mathias
    Umeå universitet.
    Liljekvist, Yvonne
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lithner, Johan
    Umeå universitet.
    Learning mathematics through algorithmic and creative reasoning2014In: Journal of Mathematical Behavior, ISSN 0732-3123, E-ISSN 1873-8028, Vol. 36, p. 20-32Article in journal (Refereed)
    Abstract [en]

    There are extensive concerns pertaining to the idea that students do not develop sufficient mathematical competence. This problem is at least partially related to the teaching of procedure-based learning. Although better teaching methods are proposed, there are very limited research insights as to why some methods work better than others, and the conditions under which these methods are applied. The present paper evaluates a model based on students’ own creation of knowledge, denoted creative mathematically founded reasoning (CMR), and compare this to a procedure-based model of teaching that is similar to what is commonly found in schools, denoted algorithmic reasoning (AR). In the present study, CMR was found to outperform AR. It was also found cognitive proficiency was significantly associated to test task performance. However the analysis also showed that the effect was more pronounced for the AR group.

  • 740.
    Jonsson, Kenny
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    The Sum of Two Integer Cubes - Restricted2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    We study the size of sets containing sums of two integer cubes such that their representation is unique and also fit between two consecutive integer cubes. We will try to write algorithms that efficiently calculate the size of these sets and also implement these algorithms in PythonTM.

    Although we will fail to find a non-iterative algorithm, we will find different ways of approximating the size of these sets. We will also find that techniques used in our failed algorithms can be used to calculate the number of integer lattice points inside a circle.

    Download full text (pdf)
    fulltext
  • 741.
    Kader, Md. Abdul
    et al.
    University Malaysia Pahang, MYS.
    Zamli, Kamal Z.
    University Malaysia Pahang, MYS.
    Ahmed, Bestoun S.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). ;Czech Technical University, CZE.
    A systematic review on emperor penguin optimizer2021In: Neural Computing & Applications, ISSN 0941-0643, E-ISSN 1433-3058, Vol. 33, no 23, p. 15933-15953Article in journal (Refereed)
    Abstract [en]

    Emperor Penguin Optimizer (EPO) is a recently developed metaheuristic algorithm to solve general optimization problems. The main strength of EPO is twofold. Firstly, EPO has low learning curve (i.e., based on the simple analogy of huddling behavior of emperor penguins in nature (i.e., surviving strategy during Antarctic winter). Secondly, EPO offers straightforward implementation. In the EPO, the emperor penguins represent the candidate solution, huddle denotes the search space that comprises a two-dimensional L-shape polygon plane, and randomly positioned of the emperor penguins represents the feasible solution. Among all the emperor penguins, the focus is to locate an effective mover representing the global optimal solution. To-date, EPO has slowly gaining considerable momentum owing to its successful adoption in many broad range of optimization problems, that is, from medical data classification, economic load dispatch problem, engineering design problems, face recognition, multilevel thresholding for color image segmentation, high-dimensional biomedical data analysis for microarray cancer classification, automatic feature selection, event recognition and summarization, smart grid system, and traffic management system to name a few. Reflecting on recent progress, this paper thoroughly presents an in-depth study related to the current EPO's adoption in the scientific literature. In addition to highlighting new potential areas for improvements (and omission), the finding of this study can serve as guidelines for researchers and practitioners to improve the current state-of-the-arts and state-of-practices on general adoption of EPO while highlighting its new emerging areas of applications.

  • 742.
    kadwadkar, shivanand
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Latency Aware SmartNIC based Load Balancer (LASLB)2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the 21th century, we see a trend in which CPU processing power is not evolving at the same pace as it did in the century before. Also, in the current generation, the data requirements and the need for higher speed are increasing every day. This increasing demand requires multiple middlebox instances in order to scale. With recent progress in virtualization, middleboxes are getting virtualized and deployed as software (Network Function (NF)s) behind commodity CPUs. Various systems perform Load Balancing (LB) functionality in software, which consumes extra CPU at the NF side. There are research work in the past which tried to move the LB functionality from software to hardware. Majority of hardware­based load balancer only provides basic LB functionality and depends on NF to provide the current performance statistics. Providing statistics feedback to LB consumes processing power at the NF and creates an inter­dependency.

     

    In this thesis work, we explore the possibility of moving the load balancing functionality to a Smart Network Interface Card (smartNIC). Our load balancer will distribute traffic among the set of CPUs where NF instances run. We will use P4 and C programming language in our design, which gives us the combination of high­speed parallel packet processing and the ability to implement relatively complex load balancing features. Our LB approach uses latency experienced by the packet as an estimate for the current CPU loading. In our design, higher latency is a sign of a more busy CPU. The Latency Aware smartNIC based Load Balancer (LASLB) also aims to reduce the tail latency by moving traffic from CPUs where traffic experiences high latency to CPU that processes traffic under low latency. The approach followed in the design does not require any statistics feedback support from the NF, which avoids the tight binding of LB with NF.

     

    Our experiment on different traffic profiles has shown that LASLB can save ~30% CPU for NF. In terms of fairness of CPU loading, our evaluation indicates that in imbalanced traffic, the LASLB can load more evenly than other evaluated methods in smartNIC­ based LB category. Our evaluation also shows that LASLB can reduce 95th percentile tail latency by ~22% compared to software load balancing.

    Download full text (pdf)
    fulltext
  • 743.
    Kanjilal, Saikat
    et al.
    South Asian University, New Dehli India.
    Persson, Lars-Erik
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Shambilova, Guldarya E
    Moscow Institute of Physics and Technology, Russia.
    Equivalent Integral Conditions Related to Bilinear Hardy-type Inequalities2019In: Mathematical Inequalities & Applications, ISSN 1331-4343, E-ISSN 1848-9966, Vol. 22, no 4, p. 1535-1548Article in journal (Refereed)
    Abstract [en]

    Infinitely many, even scales of, equivalent conditions are derived to characterize the bilinear Hardy-type inequality under various ranges of parameters.

  • 744.
    Karchevskiy, Evgueni
    et al.
    Russia.
    Shestopalov, Yuri
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Mathematical and numerical analysis of dielectric waveguides by the integral equation method2013In: Progress in Electromagnetics Research Symposium, ISSN 1559-9450, p. 388-393Article in journal (Refereed)
    Abstract [en]

    The eigenvalue problems for generalized natural modes of an inhomogeneous dielectric waveguide without a sharp boundary and a step-index dielectric waveguide with a smooth boundary of cross-section are formulated as problems for the set of time-harmonic Maxwell equations with partial radiation conditions at infinity in the cross-sectional plane. The original problems are reduced by the integral equation method to nonlinear spectral problems with Fredholm integral operators. Properties of the spectrum are investigated. The Galerkin and collocation methods for the calculations of generalized natural modes are proposed and convergence of the methods is proved. Some results of numerical experiments are discussed.

  • 745.
    Karegar, Farzaneh
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    The Lord of Their Data Under the GDPR?: Empowering Users Through Usable Transparency, Intervenability, and Consent2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The challenges imposed by the ever-growing online data processing make it difficult for people to control their data, which inevitably imperils the privacy of their personal information and making informed decisions. Thus, there is an increasing need for different societal, technological, and legal solutions that empower users to take control of their data. The intervenability rights and the enhanced transparency and consent requirements in the General Data Protection Regulation (GDPR) aim to enable users to gain control of their data. However, these rights and requirements will not be beneficial for users in practice without considering their Human-Computer Interaction (HCI) implications.

    The objective of this thesis is to propose usable tools and solutions which improve user-centred transparency, intervenability, and consent, thereby empowering users to take control of their data and make informed decisions. To this end, we employ quantitative and qualitative empirical HCI research methods and consider users through the development cycles of the proposed tools and solutions. We investigate how usable ex-post transparency can facilitate intervenability by implementing and testing Transparency-Enhancing Tools (TETs) that run on users' devices. Further, we analyse the effectiveness of engaging users with policy information through different types of interaction techniques on drawing user attention to consent form contents. We extend our investigation to the robustness of varying consent form designs to habituation. Moreover, we study how users perceive our design of adapted consent based on the demands and challenges of the technology at hand.

    This thesis contributes to bridging the gap between legally compliant and usable tools and techniques that aim to enable users to maintain control of their data, resulting in several artefacts, design guidelines, and empirical contributions. The artefacts comprise prototypes and mockups of usable TETs and consent forms. The guidelines encompass a set of design requirements for ex-post TETs that run based on privacy notifications and recommendations on how to engage users with consent form contents. Finally, the empirical contributions include the analysis of the effectiveness of the proposed means and methods on enabling users to exercise their intervenability rights and provide informed consent.

    Download full text (pdf)
    fulltext_KAPPAN
    Download (jpg)
    preview image
    Download (mp3)
    Forskningspodden with Farzaneh Karegar
  • 746.
    Karegar, Farzaneh
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Towards Improving Transparency, Intervenability, and Consent in HCI2018Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Transparency of personal data processing is enforced by most Western privacy laws, including the new General Data Protection Regulation (GDPR) which will be effective from May 2018. The GDPR specifies that personal data shall be processed lawfully, fairly, and in a transparent manner. It strengthens people's rights for both ex-ante and ex-post transparency and intervenability. Equally important is the strict legal requirements for informed consent established by the GDPR.

    On the other hand, the legal privacy principles have Human-Computer Interaction (HCI) implications. People should comprehend the principles, be aware of when the principles may be used, and be able to use them. Transparent information about personal data processing should be concise, intelligible, and provided in an easily accessible form, pursuant to the GDPR. Nonetheless, the answer to the question about how HCI implications can be addressed depends on the attempts to decrease the gap between legal and user-centric transparency, intervenability, and consent. Enhancing individuals' control in a usable way helps people to be aware of the flow of their personal information, control their data, make informed decisions, and finally preserve their privacy.

    The objective of this thesis is to propose usable tools and solutions, to enhance people's control and enforce legal privacy principles, especially transparency, intervenability, and informed consent. To achieve the goal of the thesis, different ways to improve ex-ante transparency and informed consent are investigated by designing and testing new solutions to make effective consent forms. Moreover, ex-post transparency and intervenability are improved by designing a transparency enhancing tool and investigating users' perceptions of data portability and transparency in the tool. The results of this thesis contribute to the body of knowledge by mapping legal privacy principles to HCI solutions, unveiling HCI problems and answers when aiming for legal compliance, and proposing effective designs to obtain informed consent.    

    Download full text (pdf)
    fulltext
    Download (jpg)
    preview image
    Download (mp3)
    Forskningspodden with Farzaneh Karegar
  • 747.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alaqra, Ala Sarah
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Chalmers University of Technology.
    Exploring User-Suitable Metaphors for Differentially Private Data Analyses2022In: Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022, 2022, p. 175-193Conference paper (Refereed)
    Abstract [en]

    Despite recent enhancements in the deployment of differential privacy (DP), little has been done to address the human aspects of DP-enabled systems. Comprehending the complex concept of DP and the privacy protection it provides could be challenging for lay users who should make informed decisions when sharing their data. Using metaphors could be suitable to convey key protection functionalities of DP to them. Based on a three-phase framework, we extracted and generated metaphors for differentially private data analysis models (local and central). We analytically evaluated the metaphors based on experts’ feedback and then empirically evaluated them in online interviews with 30 participants. Our results showed that the metaphorical explanations can successfully convey that perturbation protects privacy and that there is a privacy-accuracy trade-off. Nonetheless, conveying information at a high level leads to incorrect expectations that negatively affect users’ understanding and limits the ability to apply the concept to different contexts. In this paper, we presented the plausible suitability of metaphors and discussed the challenges of using them to facilitate informed decisions on sharing data with DP-enabled systems. 

  • 748.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses2021In: ACM International Conference Proceeding Series, Association for Computing Machinery (ACM), 2021, p. 29-35Conference paper (Refereed)
    Abstract [en]

    Personal data analyses, for instance, in the area of eHealth, can provide many benefits while posing privacy challenges at the same time. Applying differentially private mechanisms have become one of the dominant approaches for the protection of personal data in statistical analyses. Transparency of the privacy functionality of differentially private mechanisms can facilitate informed decision-making for using differentially private systems and understanding the privacy consequences of such decisions. However, differential privacy is a complex concept that makes it a challenge to explain the privacy functionality it comprises to lay users. Our research outlined in this vision paper aims to address this challenge in three phases by creating and analysing metaphors for conveying the functionality of differential privacy to lay data subjects who should decide about sharing their data in the context of differentially private data analysis. In this paper, we report the results of the first two phases of our study for extracting the metaphors and adapting and extending them based on two rounds of analytical evaluations and feedback from privacy experts. Further, we briefly discuss how, in the third phase, we want to move forward and empirically assess the resulting metaphors from previous steps by involving lay users.

    Download full text (pdf)
    Metaphors for differential privacy
  • 749.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Gerber, Nina
    Faculty of Human Sciences, Technische Universitat Darmstadt, Darmstadt, Hessen, Germany.
    Volkamer, Melanie
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Helping John to Make Informed Decisions on Using Social Login2018In: Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, New York: ACM Publications, 2018Chapter in book (Other academic)
  • 750.
    Karegar, Farzaneh
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Lindegren, Daniel
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Pettersson, John Sören
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Assessments of a Cloud-Based Data Wallet for Personal Identity Management2017In: Information Systems Development: Advances in Methods, Tools and Management (ISD2017 Proceedings), 2017Conference paper (Refereed)
    Abstract [en]

    Within a project developing cloud technology for identity access management, usability tests of mockups of a mobile app identity provider were conducted to assess users’ consciousness of data disclosures in consent forms and flow of authentication data. Results show that using one’s fingerprint for giving consent was easy, but most participants had not a correct view of where the fingerprint data is used and what entities would have access to it. Familiarity with ID apps appeared to aggravate misunderstanding. In addition, participants could not well recall details of personal data releases and settings for disclosure options. An evaluation with a confirmation screen slightly improved recall rate. However, some participants voiced a desire to have control over their data and expressed a wish to manually select mandatory information. This can be a way of slowing users down and make them reflect more.

    Download full text (pdf)
    fulltext
12131415161718 701 - 750 of 1658
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf