Change search
Refine search result
1234567 1 - 50 of 868
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Oldest first
  • Newest first
Select all
  • 1.
    Abdollahi, Kamran
    et al.
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Shams Shafigh, Alireza
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Improving Performance of On Demand Multicast Routing by deleting lost join query packet2010In: Proceedings of The Sixth Advanced International Conference on Telecommunications - AICT 2010, IEEE conference proceedings, 2010, 316-322 p.Conference paper (Refereed)
    Abstract [en]

    A Mobile ad hoc network is a collection of wireless nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. The network topology dynamically changes frequently in an unpredictable manner since nodes are free to move. Support for multicasting is essential in such environment as it is considered to be an efficient way to deliver information from source nodes to many client nodes. A problem with multicast routing algorithms is their efficiency as their forwarding structure determines the overall network resource consumption makes them significantly less efficient than unicast routing algorithms. In this research, we improve the performance of the popular ODMRP multicast routing protocol by restricting the domain of join query packets, which have been lost. This is achieved by augmenting the join query packets with minimum extra information (one field), which denotes the number of the visited node from previous forwarding group. Simulation results show, that our mechanisms significantly reduce the control traffic and thus the overall latency and power consumption in the network.

  • 2.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lidén, Anders
    Towards Multipath TCP Aware Security Technologies2016In: New Technologies, Mobility and Security (NTMS), 2016 8th IFIP International Conference on, IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.

  • 3. Agustí, Ramón
    et al.
    Fazekas, Péter
    Gómez Barquero, David
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Tralli, Velio
    NEWCOM DR7.2: First report on common framework/models and activities in Department 72005Report (Refereed)
    Abstract [en]

    This deliverable provides a description of the framework identified for the collaborative activities between different partners in the context of NEWCOM department 7 on QoS provision in heterogeneous wireless networks. The considered models, assumptions and expected results are pointed out for each activity. The deliverable also includes a report on the means to achieve the integration between the different partners

  • 4. Agustí, Ramón
    et al.
    Fazekas, Péter
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Studer Ferreira, Lucio
    Tralli, Velio
    NEWCOM DR7.4: Final Report on the activities carried out in Department 72007Report (Refereed)
    Abstract [en]

    This deliverable constitutes the final report of all the activities that carried out in the framework of the NEWCOM department 7. It contains a description of the main technical achievements for each one of the activities in which the department has been organised togehter with the list of indicators reflecting the degree of integration that has been achieved among the different partners

  • 5. Albertsson, A.
    et al.
    Johansson-Hidén, Birgitta
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Värmlandskliniken. Utvecklingsansvar åt alla1991Report (Other academic)
  • 6. Ali Yahiya, Tara
    et al.
    Chaouchi, Hakima
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pujolle, Guy
    Seamless Interworking of WLAN and WMAN Wireless Networks2006Conference paper (Refereed)
    Abstract [en]

    Future network environments will be heterogeneous and mobile terminals will have the opportunity to dynamically select among many different access technologies. Therefore, it is important to provide service continuity in case of vertical handovers when terminals change the access technology. Two important wireless access technologies are WLAN (Wireless Local Access Networks) and WMAN (Wireless Metropolitan Access Networks) networks. In this paper, we address several challenges related to a seamless integration of those technologies. We highlight important aspects for designing a WLAN/WMAN interworking architecture and we address important Quality of Service (QoS) issues for such interworked systems like degree of QoS support provided by the technologies, QoS mapping and signalling for vertical handover. By formulating several interworking scenarios, where WLAN users with ongoing voice, video and data sessions hand over to WMAN, we study QoS and performance issues and analyse feasibility of seamless session continuity through simulations

  • 7. Andersson, Amgnus
    et al.
    Jansson, André
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Media and Communication Studies.
    Media Use and Cultural Identity: Results and Reflections from an Interview Study in Two Different Parts of Göteborg1997Conference paper (Other (popular science, discussion, etc.))
  • 8. Andersson, Carin
    et al.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Survey and Analysis of Project Management Competence within Research Projects at Karlstad University2007Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Research at universities is today often conducted as projects. This is especially true in the engineering, natural science, medicine, and social science disciplines. Research projects are typically carried out by different categories of employers, such as professors, associate professors, assistant professors, and PhD students. These projects are typically managed by the person that applied for the project money, or the person that is the most experienced researcher at the department, which is often a professor or associate professor. From such leading persons, miracles are expected. Except acting as project managers, they are also engaged in many other parallel activities, e.g., supervision of PhD students, undergraduate and graduate education, conference organization and administration, project application writing, and representing the department internally as well as externally.



    In this report, a survey of project management competence within research projects at Karlstad University is presented. Empirical data have been gathered through two questionnaires and six complementary interviews. Professors and associate professors as well as PhD students have participated in the study. The survey shows that the active project managers have learned to lead projects based on experience and very few project managers have a formal leadership education. This implies that long established project management methods and tools are seldom used.



    Based on the outcome from the survey and our own observations, four concrete activities to improve project management skills are proposed in the report. The first activity is to provide a suitable and well-balanced course in project management methods that is offered to both active and future project managers. The second activity is to establish experience networks among active project mangers at Karlstad University. The third activity is to create a mentor program for new project managers. The fourth activity is to establish a group of experienced project managers that can assist in and give support to ongoing and planned projects.

  • 9. Andersson, Christer
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Enabling anonymity for the mobile Internet using the mCrowds system2004In: Risk and Challenges of the Network Society: Proceedings of the Second IFIP WG 9.2, 9.6/11.6, 11.7 International Summer School / [ed] Penny Duquenoy, Simone Fischer-Hübner, Jan Holvast, and Albin Zuccato, Karlstad University Press, 2004, 178-189 p.Chapter in book (Refereed)
    Abstract [en]

    The mobile Internet is a fast growing technology that introduces new privacy risks. We argue that, since privacy legislation alone is not sufficient to protect the users privacy, technical solutions to enhanceinformational privacy of individuals are also needed. This paper introduces mCrowds, a privacy-enhancing technology that combines the concept of a crowd system in a mobile Internet setting with a filteringfunctionality to enable anonymity towards the content providers

  • 10. Andersson, Christer
    et al.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    On the Fundamentals of Anonymity Metrics2007In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, 2007Conference paper (Refereed)
  • 11. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy and Anonymity in Mobile Ad Hoc Networks2008In: Mobile Computing: Concepts, Methodologies, Tools, and Applications / [ed] David Taniar, Information Science Reference , 2008Chapter in book (Refereed)
  • 12. Andersson, Christer
    et al.
    Martucci, Leonardo
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Privacy Requirements for Mobile Ad Hoc Networks2005Conference paper (Refereed)
  • 13.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    The electronic spectrum of Cr21995In: Chemical Physics Letters, 237:212Article in journal (Refereed)
  • 14.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    The electronic spectrum of VCr2003In: Theoretical Chemistry Accounts, volume 110, number 3Article in journal (Refereed)
    Abstract [en]

    The electronic spectrum of VCr has been studied using the complete-active-space self-consistent field complete-active-space second-order perturbation theory approach. Potential energy curves for 12 electronic states have been computed. Transition energies, with respect to the X^2Delta ground state, for some of the calculated electronic states are (with possible experimental values within parentheses): 0.53 eV (0.56) for A^2Sigma+, 1.03 eV (1.14) for A^4Delta, 1.20 eV (1.14) for B^2Delta, 1.45 eV (1.51) for B^4Delta, 1.60 eV (1.51, 1.78) for C^2Delta, and 1.61 eV (1.63) for A^4Sigma^-.

  • 15.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Vad är det för kunskap som värderas?2000In: Universitetsläraren, nummer 7Article in journal (Other (popular science, discussion, etc.))
  • 16.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Vad är kunskap?2006In: Kapet, nummer 1, Vol. 1Article in journal (Other (popular science, discussion, etc.))
  • 17.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Different forms of the zeroth-order Hamiltonian in second-order perturbation theory with a complete active space self-consistent field reference function1995In: Theoretica Chimica Acta, 91:31Article in journal (Refereed)
  • 18.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cellular Automata in Science2005Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Cellular automata have a widespread use in the description of complex phenomena in disciplines as disparate as, for example, physics and economics. A cellular automaton is a lattice of cells, and the cells can be in a finite number of states. By using simple local rules the states of the cells are updated in parallel at discrete time steps. In short, a cellular automaton can be characterised by the three words - simple, local, and parallel. These three words are one of the reasons for the attractiveness of cellular automata. They are simple to implement and they are well suited for parallel computers (computations). Another reason for using cellular automata are for their spatio-temporal properties. The lattice may represent space and the updating of the cells gives a

    dimension of time.



    In spite of the simplicity of cellular automata they may give rise to a complex macroscopic behaviour. This is illustrated, in this thesis, by an hydrodynamic example, namely the creation of vortices in flow behind a cylinder.



    Although cellular automata have the ability to describe complex phenomena it is sometimes hard to find the proper rules for a given macroscopic behaviour. One approach which has been successfully employed is to let cellular automata rules evolve (for example, through genetic algorithms) when finding the desired properties. In this thesis this is demonstrated for two-dimensional cellular automata with two possible states of the cells. A genetic algorithm is used to find rules that evolve a given initial configuration of the cells to another given configuration.

  • 19.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cellular Automata2003Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Properties and behavior of cellular automata are considered. Cellular automata can simply be described as lattices of cells, where the cells can be in a finite number of states. By using simple rules the states of the cells are updated at discrete time steps. The evolution of cellular automata can be used for computations. Some cellular automata display universality meaning that there is no limit to the sophistication of the computations they can perform.

  • 20.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    CASSCF second-order perturbation theory (CASPT2)1998In: Encyclopedia of Computational Chemistry / [ed] P. von Ragué Schleyer, Chichester, England: John Wiley & Sons , 1998Chapter in book (Refereed)
  • 21.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Multiconfigurational perturbation theory1992Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The aim of the thesis is to analyze a method which describes the electron correlation in atoms and molecules. The method is based on Rayleigh-Schrödinger perturbation theory with a partitioning of the Hamiltonian into a fairly simple zeroth-order operator and a perturbation operator. The zeroth-order Hamiltonian is founded on a one-electron Fock-type operator and two different operators have been tested. The zeroth-order wave function is constructed from a complete active space self-consistent field (CASSCF) calculation. This means that the zeroth-order wave function for open-shell systems and systems with strong configurational mixing (near degeneracy) can be obtained on an equal level as closed-shell (single determinant) states. The theory is formulated in such a way that the Möller-Plesset perturbation theory is obtained for the closed-shell (single determinant) state. The flexibility of the CASSCF method makes it possible, in principle, to construct the zeroth-order wave function (and the zeroth-order Hamiltonian) to any desired accuracy. The perturbation expansion of the energy is therefore expected to converge fast and only up to the second-order contribution has been implemented leading to fairly fast and accurate calculations. The aim of the computer implementation is to describe the electron correlation in small and medium-sized molecules (up to 20 atoms) accurately. The application of the perturbation method to a number of problems in chemistry is demonstrated in the thesis: (1) the calculation of electronic properties and harmonic vibrational frequencies of the ozone molecule; (2) the calculation of electric dipole polarizabilities of excited valence states of several first- and second-row atoms; (3) the calculation of excited states of the nickel atom, the benzene molecule, and the azabenzenes pyridine, pyrazine, pyridazine, and s-triazine

  • 22.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cellular Automata2004In: Promote IT 2004: proceedings of the fourth Conference for the Promotion of Research in IT at New Universities and University Colleges in Sweden : 5-7 May, 2004, Karlstad University, Sweden. P. 1 / [ed] Bubenko, Janis, Karlstad: Karlstad University Press , 2004, Vol. 2004:26, 598-608 p.Conference paper (Refereed)
    Abstract [en]

    In this paper properties and behavior of cellular automata are considered. Cellular automata can simply be described as lattices of cells, where the cells can be in a finite number of states. By using simple rules the states of the cells are updated in parallel at discrete time steps. Depending on the rule and, to a certain degree, the initial states of the cells, the evolution of a cellular automaton is restricted to a small number a ways. Some cellular automata evolve uniformly, meaning that all cells end up in the same state, while others evolve randomly, meaning that the states of the cells appear to be totally randomized during evolution. Intermediate behavior, displaying repetitiveness or nesting, also occurs.Properties of cellular automata that are discussed in the paper are, for instance, sensitivity to initial conditions, randomness, reversibility, entropy, and conservation. These properties also appear in the physical world and cellular automata provide good examples in the understanding of these properties.The evolution of cellular automata can be used for computations. Some cellular automata even display the property of universality, a term well known from the universal Turing machine, meaning that there is no limit to the sophistication of the computations they can perform.

  • 23.
    Andersson, Kerstin
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Cellular Automata2005In: Promote IT 2005: proceedings of the fifth Conference for the Promotion of Research in IT at New Universities and University Colleges in Sweden : Borlänge, Sweden 11-13 May, 2005 / [ed] Bubenko, Janis, Lund: Studentlitteratur , 2005, 21-30 p.Conference paper (Refereed)
    Abstract [en]

    Cellular automata have a widespread use in the description of complex phenomena in disciplines as disparate as for example physics and economics. They are described by a lattice of cells, states of the cells, and rules for updating the states of the cells. One characteristics of a cellular automaton is the simplicity of the rules that determine how the cellular automaton evolves in time. These rules are local, are applied in parallel to all the cells and despite their simplicity they may give rise to a complex macroscopic behaviour. In this paper this is illustrated by examples from hydrodynamics and it is shown that cellular automata might provide powerful alternatives to partial differential equations

  • 24.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Bauschlicher Jr., C. W.
    Persson, B. J.
    Roos, B. O.
    The structure of dichromium tetraformate1996In: Chemical Physics Letters, 257:238Article in journal (Refereed)
  • 25.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Borowski, P.
    Fowler, P. W.
    Malmqvist, P.-Å.
    Roos, B. O.
    Sadlej, A. J.
    Electric properties of the ozone molecule1992In: Chemical Physics Letters, 190:367Article in journal (Refereed)
  • 26.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fulscher, M. P.
    Lindh, R.
    Malmqvist, P.-Å.
    Olsen, J.
    Roos, B. O.
    Widmark, P.-O.
    MOLCAS: A general purpose quantum chemistry program system for correlated wavefunctions1994In: Methods and Techniques in Computational Chemistry: METECC-94, chapter 7, page 275 / [ed] Enrico Clementi, Cagliari, Italy: STEF , 1994Chapter in book (Refereed)
  • 27.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Malmqvist, P.-Å.
    Roos, B. O.
    Second-order perturbation theory with a complete active space self-consistent field reference function1992In: Journal of Chemical Physics, 96:1218Article in journal (Refereed)
  • 28.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Malmqvist, P.-Å.
    Roos, B. O.
    Sadlej, A. J.
    Wolinski, K.
    Second-order perturbation theory with a CASSCF reference function1990In: Journal of Physical Chemistry, 94:5483Article in journal (Refereed)
  • 29.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Roos, B. O.
    Multiconfigurational second-order perturbation theory1995In: Modern electronic structure theory, volume 1 / [ed] D. R. Yarkony, New York: World Scientific Publishing , 1995Chapter in book (Refereed)
  • 30.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Roos, B. O.
    Multiconfigurational second-order perturbation theory: A test of geometries and binding energies1993In: International Journal of Quantum Chemistry, 45:591Article in journal (Refereed)
  • 31.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Roos, B. O.
    Excitation energies in the nickel atom studied with the complete active space SCF method and second-order perturbation theory1992In: Chemical Physics Letters, 191:507Article in journal (Refereed)
  • 32.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Roos, B. O.
    Malmqvist, P.-Å.
    Widmark, P.-O.
    The Cr2 potential energy curve studied with multiconfigurational second-order perturbation theory1994In: Chemical Physics Letters, 230:391Article in journal (Refereed)
  • 33.
    Andersson, Kerstin
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Sadlej, A. J.
    Electric dipole polarizabilities of atomic valence states1992In: Physical Review A, 46:2356Article in journal (Refereed)
  • 34. Andersson, Magnus
    et al.
    Jansson, André
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Media and Communication Studies.
    The Blurring of Distinctions: Media Use and the Progressive Cultural Lifestyle1998In: Nordicom Review, Vol. 19, No. 2: 63-78Article in journal (Other academic)
  • 35. Andersson, N.
    et al.
    Arnerup-Cooper, B.
    Carlsson, Carin
    Haglund, Lars
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Business Administration. Karlstad University, Faculty of Economic Sciences, Communication and IT, The Service and Market Oriented Transport Research Group. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Studenter om studier och arbete2000Report (Refereed)
  • 36.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Users as Prosumers of PETs: The Challenge of Involving Users in the Creation of Privacy Enhancing Technologies2013In: Frameworks of IT Prosumption for Business Development / [ed] Pa´nkowska, Ma\lgorzata, IGI Global , 2013, 178-199 p.Chapter in book (Refereed)
    Abstract [en]

    Frequent contact with online businesses requires Internet users to distribute large amounts of personal information. This spreading of users’ information through different Websites can eventually lead to increased probabilities for identity theft, profiling and linkability attacks, as well as other harmful consequences. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often perceived as complicated and obtrusive by users who are not privacy aware or are not computer or technology savvy. This chapter explores the way in which users’ involvement has been considered during the development process of PETs and argues that more democratic approaches of user involvement and data handling practices are needed. It advocates towards an approach in which people are not only seen as consumers of privacy and security technologies, but where they can play a role as the producers of ideas and sources of inspiration for the development of usable PETs that meet their actual privacy needs and concerns.

  • 37.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Designing for Usable Privacy and Transparency in Digital Transactions2015Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. With every transaction, people take decisions and make disclosures of personal data. Despite the possible benefits of collecting data about a person or a group of people, massive collection and aggregation of personal data carries a series of privacy and security implications which can ultimately result in a threat to people's dignity, their finances, and many other aspects of their lives. For this reason, privacy and transparency enhancing technologies are being developed to help people protect their privacy and personal data online. However, some of these technologies are usually hard to understand, difficult to use, and get in the way of people's momentary goals.

    The objective of this thesis is to explore, and iteratively improve, the usability and user experience provided by novel privacy and transparency technologies. To this end, it compiles a series of case studies that address identified issues of usable privacy and transparency at four stages of a digital transaction, namely the information, agreement, fulfilment and after-sales stages. These studies contribute with a better understanding of the human-factors and design requirements that are necessary for creating user-friendly tools that can help people to protect their privacy and to control their personal information on the Internet.

  • 38.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable privacy for digital transactions: Exploring the usability aspects of three privacy enhancing mechanisms2012Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often seen by ordinary users as complicated and disruptive of their primary tasks.

     

    In this licentiate thesis, I investigate the usability aspects of three main privacy and security enhancing mechanisms. These mechanisms have the goal of helping and encouraging users to protect their privacy on the Internet as they engage in some of the steps necessary to complete a digital transaction. The three mechanisms, which have been investigated within the scope of different research projects, comprise of (1) graphical visualizations of service providers’ privacy policies and user-friendly management and matching of users’ privacy preferences “on the fly”, (2) methods for helping users create appropriate mental models of the data minimization property of anonymous credentials, and (3) employing touch-screen biometrics as a method to authenticate users into mobile devices and verify their identities during a digital transaction.

     

    Results from these investigations suggest that these mechanisms can make digital transactions privacy-friendly and secure while at the same time delivering convenience and usability for ordinary users.

  • 39.
    Angulo, Julio
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Usable Transparency through network representations and analyses2015In: The Future of Networked Privacy: Challenges and opportunities, 2015Conference paper (Refereed)
    Abstract [en]

    We explore how concepts from the field of network science can be employed to inform Internet users about the way their personal identifiable information (PII) is being used and shared by online services. We argue that presenting users with graphical interfaces that display information about the network structures that are formed by PII exchanges can have an impact on the decisions users take online, such as the services they choose to interact with and the information they decide release.

  • 40.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Berthold, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Elkhiyaoui, Kaoutar
    EURECOM.
    Fernandez Gago, M. Carmen
    University of Málaga.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    David, Nunez
    University of Málaga.
    Pulls, Tobias
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University.
    Reuben, Jenni
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University.
    Rompay, Cédric
    EURECOM.
    Santana de Oliveira, Anderson
    SAP Labs.
    Önen, Melek
    EURECOM.
    D:D-5.3 User-Centric Transparency Tools V22015Report (Refereed)
  • 41.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Ulrich, König
    HCI for Policy Display and Administration2011In: Privacy and Identity Management for Life / [ed] Jan Camenish, Simone Fischer-Hübner and Kai Rannenberg, Berlin: Springer Berlin/Heidelberg, 2011, 1, 261-277 p.Chapter in book (Refereed)
    Abstract [en]

    The PrimeLife Policy Language (PPL) has the objective of helping end users make the data handling practices of data controllers more transparent, allowing them to make well-informed decisions about the release of personal data in exchange for services. In this chapter, we present our work on user interfaces for the PPL policy engine, which aims at displaying the core elements of a data controller's privacy policy in an easily understandable way as well as displaying how far it corresponds with the user's privacy preferences. We also show how privacy preference management can be simplified for end users.

  • 42.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures2015In: CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems / [ed] Bo Begole, Jinwoo Kim, Kori Inkpen, Woontack Woo, Association for Computing Machinery (ACM), 2015, 1803-18098 p.Conference paper (Refereed)
    Abstract [en]

    We present a prototype of the user interface of a transparency tool that displays an overview of a user's data disclosures to different online service providers and allows them to access data collected about them stored at the services' sides. We explore one particular type of visualization method consisting of tracing lines that connect a user's disclosed personal attributes to the service to which these attributes have been disclosed. We report on the ongoing iterative process of design of such visualization, the challenges encountered and the possibilities for future improvements.

  • 43.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Towards Usable Privacy Policy Display & Management2012In: Information Management & Computer Security, ISSN 0968-5227, Vol. 20, 4-17 p.Article in journal (Refereed)
    Abstract [en]

    This paper discusses the approach taken within the PrimeLife project for providing user-friendly privacy policy interfaces for the PrimeLife Policy Language (PPL).We present the requirements, design process and usability testing of the “Send Data?” prototype, a browser extension designed and developed to deal with the powerful features provided by PPL. Our interface introduces the novel features of “on the fly” privacy management, predefined levels of privacy settings, and simplified selectionof anonymous credentials. Results from usability tests showed that users understand and appreciate these features and perceive them as being privacy-friendly, and they are therefore suggested as a good approach towards usable privacy policy display and management. Additionally, we present our lessons learnt in the design process of privacy policy interfaces.

  • 44.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center.
    Pulls, Tobias
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Towards Usable Privacy Policy Display & Management: The PrimeLife Approach2011In: Proceedings of 5th International Symposium on Human Aspects of Information Security & Assurance / [ed] Steven Furnell, Plymouth: University of Plymouth , 2011, 108-118 p.Conference paper (Refereed)
  • 45.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Ortlieb, Martin
    “WTH..!?!” Experiences, reactions, and expectations related to online privacy panic situationsManuscript (preprint) (Other academic)
  • 46.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Identity Management for online transactions - Using ‘Profiles’ to segregate personal information2012Manuscript (preprint) (Other academic)
  • 47.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Identity Management through “Profiles”: Prototyping an Online Information Segregation Service2013In: Human-Computer Interaction. Users and Contexts of Use.: 15th International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings, Part III, Springer Berlin/Heidelberg, 2013, Vol. 8006, 10-19 p.Conference paper (Refereed)
    Abstract [en]

    Whereas in real everyday life individuals have an intuitive approach at deciding which information to disseminate to others, in the digital world it becomes difficult to keep control over the information that is distributed to different online services. In this paper we present the design of a user interface for a system that can help users decide which pieces of information to distribute to which type of service providers by allowing them to segregate their information attributes into various personalized profiles. Iterative usability evaluations showed that users understand and appreciate the possibility to segregate information, and revealed possible improvements, implications and limitations of such an interface.

  • 48.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Exploring Touch-Screen Biometrics for User Identification on Smart Phones2011In: Privacy and Identity Managementfor Life: Proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School 2011 / [ed] an Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, and Giovanni Russello, Springer, 2011, 130-143 p.Conference paper (Refereed)
    Abstract [en]

    The use of mobile smart devices for storing sensitive informationand accessing online services is increasing. At the same time, methods for authenticating users into their devices and online services that are not only secure, but also privacy and user-friendly are needed. In this paper, we present our initial explorations of the use of lock pattern dynamics as a secure and user-friendly two-factor authentication method. We developed an application for the Android mobile platform to collect data on the way individuals draw lock patterns on a touchscreen. Using a Random Forest machine learning classier this method achieves an average Equal Error Rate (EER) of approximately 10.39%, meaning that lock patterns biometrics can be used for identifying users towards their device, but could also pose a threat to privacy if the users' biometric information is handled outside their control.

  • 49.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology.
    Gullberg, Peter
    Gemalto, Gothenburg.
    Kling, Daniel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Tavemark, Daniel
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Understanding the user experience of secure mobile online transactions in realistic contexts of use2012In: Symposium on Usable Privacy and Security (SOUPS) 2012, Washington D.C.,USA: ACM Digital Library, 2012, 8- p.Conference paper (Refereed)
    Abstract [en]

    Possible attacks on mobile smart devices demand higher security for applications handling payments or sensitive information. The introduction of a tamper-proof area on future generations of mobile devices, called Trusted Execution Environment (TEE), is being implemented. Before devices with embedded TEEs can be deployed to the public, investigations on usability aspects of Trusted User Interfaces (TUI) are needed. This article describes the process we have followed at gathering requirements, prototyping and testing suitable designs for TUIs in combination with a touch-screen biometric system. At the end, we present relevant findings of a pilot study that we have conducted using an Experience Sampling Method (ESM) as part of our ongoing work.

  • 50.
    Angulo, Julio
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Wästlund, Erik
    Johan, Högberg
    What Would It Take for You to Tell Your Secrets to a Cloud?: Studying decision factors when disclosing information to cloud services2014In: Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings, Springer, 2014, Vol. 8788, 129-145 p.Conference paper (Refereed)
    Abstract [en]

    We investigate the end users’ behaviours and attitudes with regards to the control they place in the personal information that they disclose to cloud storage services. Three controlled experiments were carried out to study the influence in users’ decisions to retain or surrender control over their personal information depending on different factors. The results of these experiments reveal, among other things, the users’ willingness to surrender control over personal information that is perceived as non-sensitive in exchange for valuable rewards, and that users would value the possibility of knowing and controlling the parties who are granted access to their data in the cloud. Based on the results from the experiments we provide implications for the design of end-user tools that can promote transparency and accountability in cloud computing environments.

1234567 1 - 50 of 868
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf