Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
151. Zhang, Bingsheng; Balogun, Hamed: On the Sustainability of Blockchain Funding. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-zhang_sustainability_2018,
title = {On the Sustainability of Blockchain Funding},
author = {Bingsheng Zhang and Hamed Balogun},
url = {https://doi.org/10.1109%2Ficdmw.2018.00020},
doi = {10.1109/icdmw.2018.00020},
year = {2018},
date = {2018-11-17},
booktitle = {2018 IEEE International Conference on Data Mining Workshops (ICDMW)},
publisher = {IEEE},
abstract = {Blockchain technology has pioneered a new consensus approach to building a distributed public ledger globally. A key feature expected from cryptocurrencies and blockchain systems is the absence of a centralized control over the operation process. That is, blockchain solutions should neither rely on "trusted parties or powerful minority" for their operations nor introduce such centralisation tendencies into blockchain systems. On the other hand, real-world blockchain systems require steady funding for continuous development and maintenance of the systems. Given that blockchain systems are decentralized systems, their maintenance and developmental funding should also be void of centralization risks. Therefore, secure and "community-inclusive" long-term sustainability of funding is critical for the health of blockchain platforms. In this work, for the first time, we provide a systematic exposition of blockchain development funding, planning, management, and disbursement mechanisms aka "treasury systems" (for cryptocurrencies and blockchain systems). Drawing from existing literature, we identify and categorise various treasury models, thereby enabling an exploration of their properties, benefits and drawbacks. Particularly, we perform an evaluation of real-world cryptocurrency treasury system of top cryptocurrencies e.g., Dash governance system, and ZCash Foundation. Finally, we briefly discuss desired properties of decentralised treasury systems and provide suggestions for improvement or alternative solutions to existing systems or implementations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
152. Tomić, Ivana; Chen, Po-Yu; Breza, Michael J.; McCann, Julie A.: Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks. In: MobiQuitous '18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tomic_antilizer_2018,
title = {Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks},
author = {Ivana Tomi\'{c} and Po-Yu Chen and Michael J. Breza and Julie A. McCann},
url = {https://doi.org/10.1145%2F3286978.3287029},
doi = {10.1145/3286978.3287029},
year = {2018},
date = {2018-11-05},
booktitle = {MobiQuitous '18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
publisher = {ACM},
abstract = {Wireless Sensor Network (WSN) applications range from domestic Internet of Things systems like temperature monitoring of homes to the monitoring and control of large-scale critical infrastructures. The greatest risk with the use of WSNs in critical infrastructure is their vulnerability to malicious network level attacks. Their radio communication network can be disrupted, causing them to lose or delay data which will compromise system functionality. This paper presents Antilizer, a lightweight, fully-distributed solution to enable WSNs to detect and recover from common network level attack scenarios. In Antilizer each sensor node builds a self-referenced trust model of its neighbourhood using network overhearing. The node uses the trust model to autonomously adapt its communication decisions. In the case of a network attack, a node can make neighbour collaboration routing decisions to avoid affected regions of the network. Mobile agents further bound the damage caused by attacks. These agents enable a simple notification scheme which propagates collaborative decisions from the nodes to the base station. A filtering mechanism at the base station further validates the authenticity of the information shared by mobile agents. We evaluate Antilizer in simulation against several routing attacks. Our results show that Antilizer reduces data loss down to 1% (4% on average), with operational overheads of less than 1% and provides fast network-wide convergence.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
153. Bhatia, Laksh; Tomić, Ivana; McCann, Julie A.: LPWA-MAC: a Low Power Wide Area network MAC protocol for cyber-physical systems. In: SenSys '18: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bhatia_lpwa_2018,
title = {LPWA-MAC: a Low Power Wide Area network MAC protocol for cyber-physical systems},
author = {Laksh Bhatia and Ivana Tomi\'{c} and Julie A. McCann},
url = {https://doi.org/10.1145%2F3274783.3275183},
doi = {10.1145/3274783.3275183},
year = {2018},
date = {2018-11-04},
booktitle = {SenSys '18: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems},
publisher = {ACM},
abstract = {Low-Power Wide-Area Networks (LPWANs) are being successfully used for the monitoring of large-scale systems that are delay-tolerant and which have low-bandwidth requirements. The next step would be instrumenting these for the control of Cyber-Physical Systems (CPSs) distributed over large areas which require more bandwidth, bounded delays and higher reliability or at least more rigorous guarantees therein. This paper presents LPWA-MAC, a novel Low Power Wide-Area network MAC protocol, that ensures bounded end-to-end delays, high channel utility and supports many of the different traffic patterns and data-rates typical of CPS.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
154. Bhatia, Laksh; Boyle, David E.; McCann, Julie A.: Aerial Interactions with Wireless Sensors. In: SenSys '18: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bhatia_aerial_2018,
title = {Aerial Interactions with Wireless Sensors},
author = {Laksh Bhatia and David E. Boyle and Julie A. McCann},
url = {https://doi.org/10.1145%2F3274783.3275189},
doi = {10.1145/3274783.3275189},
year = {2018},
date = {2018-11-04},
booktitle = {SenSys '18: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems},
publisher = {ACM},
abstract = {Sensing systems incorporating unmanned aerial vehicles have the potential to enable a host of hitherto impractical monitoring applications using wireless sensors in remote and extreme environments. Their use as data collection and power delivery agents can overcome challenges such as poor communications reliability in difficult RF environments and maintenance in areas dangerous for human operatives. Aerial interaction with wireless sensors presents some interesting new challenges, including selecting or designing appropriate communications protocols that must account for unique practicalities like the effects of velocity and altitude. This poster presents a practical evaluation of the effects of altitude when collecting sensor data using an unmanned aerial vehicle. We show that for an otherwise disconnected link over a long distance (70m), by increasing altitude (5m) the link is created and its signal strength continues to improve over tens of metres. This has interesting implications for protocol design and optimal aerial route planning.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
155. Tallyn, Ella; Pschetz, Larissa; Gianni, Rory; Speed, Chris; Elsden, Chris: Exploring Machine Autonomy and Provenance Data in Coffee Consumption. In: vol. 2, no. CSCW, pp. 1–25, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-tallyn_exploring_2018,
title = {Exploring Machine Autonomy and Provenance Data in Coffee Consumption},
author = {Ella Tallyn and Larissa Pschetz and Rory Gianni and Chris Speed and Chris Elsden},
url = {https://doi.org/10.1145%2F3274439},
doi = {10.1145/3274439},
year = {2018},
date = {2018-11-01},
volume = {2},
number = {CSCW},
pages = {1--25},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Technologies such as distributed ledgers and smart contracts are enabling the emergence of new autonomous systems, and providing enhanced systems to track the provenance of goods. A growing body of work in HCI is exploring the novel challenges of these systems, but there has been little attention paid to their impact on everyday activities. This paper presents a study carried out in 3 office environments for a 1-month period, which explored the impact of an autonomous coffee machine on the everyday activity of coffee consumption. The Bitbarista mediates coffee consumption through autonomous processes, presenting provenance data at the time of purchase while attempting to reduce intermediaries in the coffee trade. Through the report of interactions with and around the Bitbarista, we explore its implications for everyday life, and wider social structures and values. We conclude by offering recommendations for the design of community shared autonomous systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
156. Vargo, Stephen L.; Lusch, Robert F. (Ed.): The SAGE Handbook of Service-Dominant Logic. SAGE Publications Ltd, 2018, ISBN: 9781526402837. (Type: Collection | Abstract | Links | BibTeX) @collection{col-vargo_sage_2018,
title = {The SAGE Handbook of Service-Dominant Logic},
editor = {Stephen L. Vargo and Robert F. Lusch},
url = {https://www.ebook.de/de/product/32557994/the_sage_handbook_of_service_dominant_logic.html},
isbn = {9781526402837},
year = {2018},
date = {2018-10-27},
publisher = {SAGE Publications Ltd},
abstract = {The SAGE Handbook of Service-Dominant Logic, edited by Robert Lusch and Stephen Vargo, will be an authoritative guide to scholars across disciplines who are conducting or wish to conduct research on S-D logic. The handbook consists of ten sections and approximately 40 individual chapters:
1 Introduction and Background (Robert Lusch and Stephen L. Vargo, US)
2 Value Cocreation (Janet McColl-Kennedy, Australia)
3 Actors and Practices (Hans Kjellberg, Sweden and Suvi Nenonen, New Zealand)
4 Resource Integration (Linda Peters, UK)
5 Service Exchange (Melissa Akaka, US)
6 Institutions and Institutional Arrangements (Michael Kleinaltenkamp, Germany)
7 Service Ecosystems (Irene Ng, UK)
8 Service Innovation (Marja Toivonen, Finland)
9 Midrange Theory (Rod Brodie, New Zealand)
10 Selected Applications (Kaj Storbacka, New Zealand)},
keywords = {},
pubstate = {published},
tppubtype = {collection}
}
1 Introduction and Background (Robert Lusch and Stephen L. Vargo, US)
2 Value Cocreation (Janet McColl-Kennedy, Australia)
3 Actors and Practices (Hans Kjellberg, Sweden and Suvi Nenonen, New Zealand)
4 Resource Integration (Linda Peters, UK)
5 Service Exchange (Melissa Akaka, US)
6 Institutions and Institutional Arrangements (Michael Kleinaltenkamp, Germany)
7 Service Ecosystems (Irene Ng, UK)
8 Service Innovation (Marja Toivonen, Finland)
9 Midrange Theory (Rod Brodie, New Zealand)
10 Selected Applications (Kaj Storbacka, New Zealand)157. Krutzinna, Jenny; Taddeo, Mariarosaria; Floridi, Luciano: Enabling Posthumous Medical Data Donation: An Appeal for the Ethical Utilisation of Personal Health Data. In: vol. 25, no. 5, pp. 1357–1387, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-krutzinna_enabling_2018,
title = {Enabling Posthumous Medical Data Donation: An Appeal for the Ethical Utilisation of Personal Health Data},
author = {Jenny Krutzinna and Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1007%2Fs11948-018-0067-8},
doi = {10.1007/s11948-018-0067-8},
year = {2018},
date = {2018-10-24},
volume = {25},
number = {5},
pages = {1357--1387},
publisher = {Springer Science and Business Media LLC},
abstract = {This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, similar to the way in which they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute at the University of Oxford. Ten arguments are provided to support the need to foster posthumous medical data donation. Two major risks are also identified\textemdashharm to others, and lack of control over the use of data\textemdashwhich could follow from unregulated donation of medical data. The argument that record-based medical research should proceed without the need to secure informed consent is rejected, and instead a voluntary and participatory approach to using personal medical data should be followed. The analysis concludes by stressing the need to develop an ethical code for data donation to minimise the risks, and offers five foundational principles for ethical medical data donation suggested as a draft code.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
158. Lindley, Joseph Galen; Coulton, Paul; Cooper, Rachel: The IoT and Unpacking the Heffalump's Trunk. In: FTC 2018: Proceedings of the Future Technologies Conference (FTC) 2018, pp. 134–151, Springer International Publishing, 2018. (Type: Incollection | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-lindley_iot_2018,
title = {The IoT and Unpacking the Heffalump's Trunk},
author = {Joseph Galen Lindley and Paul Coulton and Rachel Cooper},
url = {https://doi.org/10.1007%2F978-3-030-02686-8_11},
doi = {10.1007/978-3-030-02686-8_11},
year = {2018},
date = {2018-10-18},
booktitle = {FTC 2018: Proceedings of the Future Technologies Conference (FTC) 2018},
pages = {134--151},
publisher = {Springer International Publishing},
abstract = {In this paper we highlight design challenges that the Internet of Things (IoT) poses in relation to two of the guiding design paradigms of our time; Privacy by Design (PbD) and Human Centered Design (HCD). The terms IoT, PbD, and HCD are both suitcase terms, meaning that they have a variety of meanings packed within them. Depending on how the practices behind the terms are applied, notwithstanding their well-considered foundations, intentions, and theory, we explore how PbD and HCD can, if not considered carefully, become Heffalump traps and hence act in opposition to the very challenges they seek to address. In response to this assertion we introduce Object Oriented Ontology (OOO) and experiment with its theoretical framing order to articulate possible strategies for mitigating these challenges when designing for the Internet of Things.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
159. Cath, Corinne: Governing artificial intelligence: ethical, legal and technical opportunities and challenges. In: vol. 376, no. 2133, pp. 20180080, 2018, ISSN: 1471-2962. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-cath_governing_2018,
title = {Governing artificial intelligence: ethical, legal and technical opportunities and challenges},
author = {Corinne Cath},
editor = {Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1098%2Frsta.2018.0080},
doi = {10.1098/rsta.2018.0080},
issn = {1471-2962},
year = {2018},
date = {2018-10-15},
volume = {376},
number = {2133},
pages = {20180080},
publisher = {The Royal Society},
series = {The ethical impact of data science},
abstract = {This paper is the introduction to the special issue entitled: 'Governing artificial intelligence: ethical, legal and technical opportunities and challenges'. Artificial intelligence (AI) increasingly permeates every aspect of our society, from the critical, like urban infrastructure, law enforcement, banking, healthcare and humanitarian aid, to the mundane like dating. AI, including embodied AI in robotics and techniques like machine learning, can improve economic, social welfare and the exercise of human rights. Owing to the proliferation of AI in high-risk areas, the pressure is mounting to design and govern AI to be accountable, fair and transparent. How can this be achieved and through which frameworks? This is one of the central questions addressed in this special issue, in which eight authors present in-depth analyses of the ethical, legal-regulatory and technical challenges posed by developing governance regimes for AI systems. It also gives a brief overview of recent developments in AI governance, how much of the agenda for defining AI regulation, ethical frameworks and technical approaches is set, as well as providing some concrete suggestions to further the debate on AI governance.
This article is part of the theme issue 'Governing artificial intelligence: ethical, legal, and technical opportunities and challenges'.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
This article is part of the theme issue 'Governing artificial intelligence: ethical, legal, and technical opportunities and challenges'.160. Rashid, Awais; Tippenhauer, Nils Ole: CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. In: CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-rashid_cps_2018,
title = {CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy},
author = {Awais Rashid and Nils Ole Tippenhauer},
url = {https://doi.org/10.1145%2F3243734.3243874},
doi = {10.1145/3243734.3243874},
year = {2018},
date = {2018-10-15},
booktitle = {CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
publisher = {ACM},
abstract = {Cyber-Physical Systems (CPS) are becoming increasingly critical for the well-being of society (e.g., electricity generation and distribution, water treatment, implantable medical devices etc.). While the convergence of computing, communications and physical control in such systems provides benefits in terms of efficiency and convenience, the attack surface resulting from this convergence poses unique security and privacy challenges. These systems represent the new frontier for cyber risk. CPS-SPC is an annual forum in its 4th edition this year, that aims to provide a focal point for the research community to begin addressing the security and privacy challenges of CPS in a comprehensive and multidisciplinary manner and, in tandem with other efforts, build a comprehensive research road map.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
161. Trotter, Ludwig; Harding, Mike; Mikusz, Mateusz; Davies, Nigel: IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats. In: vol. 17, no. 3, pp. 23–34, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-trotter_iot_2018,
title = {IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats},
author = {Ludwig Trotter and Mike Harding and Mateusz Mikusz and Nigel Davies},
url = {https://doi.org/10.1109%2Fmprv.2018.03367732},
doi = {10.1109/mprv.2018.03367732},
year = {2018},
date = {2018-10-11},
volume = {17},
number = {3},
pages = {23--34},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {IoT technologies are increasingly being deployed to support the operation and maintenance of complex highway infrastructure assets. However, the use of interconnected cyber-physical systems in such critical infrastructure raises important privacy, security, and safety issues. While these issues are well studied in IoT transportation systems and autonomous vehicles, little research relates to highway maintenance systems. In this article, we introduce the problem domain, evince the lack of prior research, and discuss example threats based on a real-world case study.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
162. Shaw, Peter; Mikusz, Mateusz; Nurmi, Petteri; Davies, Nigel: Tacita: A Privacy Preserving Public Display Personalisation Service. In: UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-shaw_tacita_2018,
title = {Tacita: A Privacy Preserving Public Display Personalisation Service},
author = {Peter Shaw and Mateusz Mikusz and Petteri Nurmi and Nigel Davies},
url = {https://doi.org/10.1145%2F3267305.3267627},
doi = {10.1145/3267305.3267627},
year = {2018},
date = {2018-10-08},
booktitle = {UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers},
publisher = {ACM},
abstract = {In this demonstration, we present a full implementation of Tacita, a display personalisation system designed to address viewer privacy concerns whilst still capable of providing relevant content to viewers and therefore increasing the value of displays.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
163. Zhang, Bingsheng: Blockchain: How a treasury system will foster better collaborative intelligence for cryptocurrencies. In: 2018. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-zhang_blockchain_2018,
title = {Blockchain: How a treasury system will foster better collaborative intelligence for cryptocurrencies},
author = {Bingsheng Zhang},
url = {https://www.openaccessgovernment.org/intelligence-for-cryptocurrencies/53006/},
year = {2018},
date = {2018-10-08},
abstract = {Blockchain technology has pioneered a new consensus approach to build a distributed public ledger globally. One of the key features expected from cryptocurrencies and blockchain systems is the absence of a centralised control over the operation process. That is, blockchain solutions should neither rely on "trusted parties or powerful minority" for their operations nor introduce such centralisation tendencies into blockchain systems.
On the other hand, real-world blockchain systems require steady funding for the continuous development and maintenance. Given that blockchain systems are decentralised, their maintenance and developmental funding should also be void of centralisation risks. Therefore, secure and "community-inclusive" long-term sustainability of funding is critical for the health of blockchain platforms.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
On the other hand, real-world blockchain systems require steady funding for the continuous development and maintenance. Given that blockchain systems are decentralised, their maintenance and developmental funding should also be void of centralisation risks. Therefore, secure and "community-inclusive" long-term sustainability of funding is critical for the health of blockchain platforms.164. Schneiders, Alexandra; Shipworth, David: Energy Cooperatives: A Missing Piece of the Peer-to-Peer Energy Regulation Puzzle?. In: 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-schneiders_energy_2018,
title = {Energy Cooperatives: A Missing Piece of the Peer-to-Peer Energy Regulation Puzzle?},
author = {Alexandra Schneiders and David Shipworth},
url = {https://doi.org/10.2139%2Fssrn.3252486},
doi = {10.2139/ssrn.3252486},
year = {2018},
date = {2018-09-25},
publisher = {Elsevier BV},
abstract = {Peer-to-peer (P2P) energy trading is emerging as a new mechanism for settling exchanges of energy between renewable energy generators and consumers. Often facilitated through distributed ledgers ('blockchains'), it provides a mechanism for matching local supply and demand. Energy communities across Europe, including in the United Kingdom (UK), have realised the potential of this technology and are currently running pilots testing its applicability to P2P energy trading. The aim of this paper is to analyse whether the legal forms available to energy communities in the United Kingdom could help resolve some of the uncertainties around individual energy consumers using blockchain for peer-to-peer energy trading. These include the legal recognition of 'prosumers' acting as consumers and entrepreneurs, the protection of their personal data, as well as the validity of 'smart contracts' programmed to trade energy on the blockchain network. There is currently a lack of legal clarity on these issues. The analysis has shown that legal entities such as Limited Liability Partnerships and particularly Co-operative Societies can play a crucial role in providing the necessary framework to protect consumers when using smart contracts and engaging in P2P transactions.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
165. Safa, Nader Sohrabi; Maple, Carsten; Haghparast, Mahboobeh; Watson, Tim; Dianati, Mehrdad: An opportunistic resource management model to overcome resource-constraint in the Internet of Things. In: vol. 31, no. 8, pp. e5014, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-safa_opportunistic_2018,
title = {An opportunistic resource management model to overcome resource-constraint in the Internet of Things},
author = {Nader Sohrabi Safa and Carsten Maple and Mahboobeh Haghparast and Tim Watson and Mehrdad Dianati},
url = {https://doi.org/10.1002%2Fcpe.5014},
doi = {10.1002/cpe.5014},
year = {2018},
date = {2018-09-25},
volume = {31},
number = {8},
pages = {e5014},
publisher = {Wiley},
abstract = {Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and privacy protection in the domain of IoT. The capacity of fog and cloud computing such as efficient computing, data access, network and storage, supporting mobility, location awareness, heterogeneity, scalability, and low latency in secure communication positively influence information security and privacy protection in IoT. This study illustrates the positive effect of fog and cloud computing on the security of IoT systems and presents a decision-making model based on the object's characteristics such as computational power, storage, memory, energy consumption, bandwidth, packet delivery, hop-count, etc. This helps an IoT system choose the best nodes for creating the fog that we need in the IoT system. Our experiment shows that the proposed approach has less computational, communicational cost, and more productivity in compare with the situation that we choose the smart objects randomly to create a fog.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
166. Madaan, Aastha; Nurse, Jason R. C.; Roure, David Charles De; O'Hara, Kieron; Hall, Wendy; Creese, Sadie: A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. In: 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-madaan_storm_2018,
title = {A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines},
author = {Aastha Madaan and Jason R. C. Nurse and David Charles De Roure and Kieron O'Hara and Wendy Hall and Sadie Creese},
url = {https://doi.org/10.2139%2Fssrn.3250383},
doi = {10.2139/ssrn.3250383},
year = {2018},
date = {2018-09-16},
publisher = {Elsevier BV},
abstract = {The concept of 'social machines' is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fade on the Web. The relationship between humans and machines is made more complex by the adoption of Internet of Things (IoT) sensors and devices. The scale, automation, continuous sensing, and actuation capabilities of these devices add an extra dimension to the relationship between humans and machines making it difficult to understand their evolution at either the systemic or the conceptual level. This article describes these new socio-technical systems, which we term Cyber-Physical Social Machines, through different exemplars, and considers the associated challenges of security and privacy.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
167. Tomić, Ivana; Bhatia, Laksh; Breza, Michael J.; McCann, Julie A.: The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems. In: 2018 UKACC 12th International Conference on Control (CONTROL), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tomic_limits_2018,
title = {The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems},
author = {Ivana Tomi\'{c} and Laksh Bhatia and Michael J. Breza and Julie A. McCann},
url = {https://doi.org/10.1109%2Fcontrol.2018.8516774},
doi = {10.1109/control.2018.8516774},
year = {2018},
date = {2018-09-05},
booktitle = {2018 UKACC 12th International Conference on Control (CONTROL)},
publisher = {IEEE},
abstract = {Wireless sensors and actuators offer benefits to large industrial control systems. The absence of wires for communication reduces the deployment cost, maintenance effort, and provides greater flexibility for sensor and actuator location and system architecture. These benefits come at a cost of a high probability of communication delay or message loss due to the unreliability of radio-based communication. This unreliability poses a challenge to contemporary control systems that are designed with the assumption of instantaneous and reliable communication. Wireless sensors and actuators create a paradigm shift in engineering energy-efficient control schemes coupled with robust communication schemes that can maintain system stability in the face of unreliable communication. This paper investigates the feasibility of using the low-power wide-area communication protocol LoRaWAN with an event-triggered control scheme through modelling in Matlab. We show that LoRaWAN is capable of meeting the maximum delay and message loss requirements of an event-triggered controller for certain classes of applications. We also expose the limitation in the use of LoRaWAN when message size or communication range requirements increase or the underlying physical system is exposed to significant external disturbances.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
168. Yuan, Hu; Maple, Carsten; Ghirardello, Kevin: Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis. In: 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-yuan_dynamic_2018,
title = {Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis},
author = {Hu Yuan and Carsten Maple and Kevin Ghirardello},
url = {https://doi.org/10.1109%2Fvtcfall.2018.8690703},
doi = {10.1109/vtcfall.2018.8690703},
year = {2018},
date = {2018-08-27},
booktitle = {2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)},
publisher = {IEEE},
abstract = {In this paper, we present realistic urban simulation results for store-carry-forward (SCF) relay communications within a cellular network. We describe two dynamic routing algorithms, minimising outage and minimising data packet travel time, which feature enhancements to increase the routing flexibility. It is shown that these enhancements to increase flexibility in re-routing the data leads to a dramatic decrease in the outage probability while only increasing packet travel time slightly. A misbehaviour model is analysed in this paper, in which misbehaving vehicles fail to follow the rules of the SCF routing algorithms. There are various reasons for a rogue vehicle to fail to obey the routing algorithm, including an intention to modify the message before onward transmission. Misbehaviour is detected by considering expected traffic density distributions. A Hidden Markov Model (HMM) is used to detect misbehaviour based on how data is passed by vehicles. Results show that the probability that misbehaviour is detected is 87% using this approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
169. Yuan, Hu; Maple, Carsten; Lu, Yi; Watson, Tim: Peer-assisted location authentication and access control for wireless networks. In: vol. 2, no. 1, pp. e71, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-yuan_peer_2018,
title = {Peer-assisted location authentication and access control for wireless networks},
author = {Hu Yuan and Carsten Maple and Yi Lu and Tim Watson},
url = {https://doi.org/10.1002%2Fitl2.71},
doi = {10.1002/itl2.71},
year = {2018},
date = {2018-08-13},
volume = {2},
number = {1},
pages = {e71},
publisher = {Wiley},
abstract = {This paper presents the development and implementation of a location-based, lightweight peer-assisted authentication scheme for use in wireless networks. The notion of peer-assisted authentication is based upon some target user equipment- (UE) seeking authentication and access to a network based upon its physical location. The target UE seeks authentication through the UE of peers in the same network. Compared with previous work, the approach in this paper does not rely on any cryptographic proofs from a central authentication infrastructure, thus avoiding complex infrastructure management. However, the peer-assisted authentication consumes network channel resources which will impact on network performance. In this paper, we also present an access control algorithm for balancing the location authentication, network quality of service (QoS), network capacity and time delay. The results demonstrate that peer-assisted authentication considering location authentication and system QoS through dynamic access control strategies can be effectively and efficiently implemented in a number of use cases.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
170. Lundbæk, Leif-Nissen; Beutel, Daniel Janes; Huth, Michael; Jackson, Stephen; Kirk, Laurence M.; Steiner, Robert: Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols. In: vol. 5, no. 8, pp. 180422, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lundbaek_proof_2018,
title = {Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols},
author = {Leif-Nissen Lundb\aek and Daniel Janes Beutel and Michael Huth and Stephen Jackson and Laurence M. Kirk and Robert Steiner},
url = {https://doi.org/10.1098%2Frsos.180422},
doi = {10.1098/rsos.180422},
year = {2018},
date = {2018-08-08},
volume = {5},
number = {8},
pages = {180422},
publisher = {The Royal Society},
abstract = {We adjust the Proof of Work (PoW) consensus mechanism used in Bitcoin and Ethereum so that we can build on its strength while also addressing, in part, some of its perceived weaknesses. Notably, our work is motivated by the high energy consumption for mining PoW, and we want to restrict the use of PoW to a configurable, expected size of nodes, as a function of the local blockchain state. The approach we develop for this rests on three pillars: (i) Proof of Kernel Work (PoKW), a means of dynamically reducing the set of nodes that can participate in the solving of PoW puzzles such that an adversary cannot increase his attack surface because of such a reduction; (ii) Practical Adaptation of Existing Technology, a realization of this PoW reduction through an adaptation of existing blockchain and enterprise technology stacks; and (iii) Machine Learning for Adaptive System Resiliency, the use of techniques from artificial intelligence to make our approach adaptive to system, network and attack dynamics. We develop here, in detail, the first pillar and illustrate the second pillar through a real use case, a pilot project done with Porsche on controlling permissions to vehicle and data log accesses. We also discuss pertinent attack vectors for PoKW consensus and their mitigation. Moreover, we sketch how our approach may lead to more democratic PoKW-based blockchain systems for public networks that may inherit the resilience of blockchains based on PoW.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
171. Binns, Reuben Daniel; Zhao, Jun; Kleek, Max Goodwin Van; Shadbolt, Nigel R.: Measuring Third-party Tracker Power across Web and Mobile. In: vol. 18, no. 4, pp. 1–22, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-binns_measuring_2018,
title = {Measuring Third-party Tracker Power across Web and Mobile},
author = {Reuben Daniel Binns and Jun Zhao and Max Goodwin Van Kleek and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3176246},
doi = {10.1145/3176246},
year = {2018},
date = {2018-08-07},
volume = {18},
number = {4},
pages = {1--22},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Third-party networks collect vast amounts of data about users via websites and mobile applications. Consolidations among tracker companies can significantly increase their individual tracking capabilities, prompting scrutiny by competition regulators. Traditional measures of market share, based on revenue or sales, fail to represent the tracking capability of a tracker, especially if it spans both web and mobile. This article proposes a new approach to measure the concentration of tracking capability, based on the reach of a tracker on popular websites and apps. Our results reveal that tracker prominence and parent-subsidiary relationships have significant impact on accurately measuring concentration.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
172. Smart, Paul R.; Madaan, Aastha; Hall, Wendy: Where the smart things are: social machines and the Internet of Things. In: vol. 18, no. 3, pp. 551–575, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-smart_where_2018,
title = {Where the smart things are: social machines and the Internet of Things},
author = {Paul R. Smart and Aastha Madaan and Wendy Hall},
url = {https://doi.org/10.1007%2Fs11097-018-9583-x},
doi = {10.1007/s11097-018-9583-x},
year = {2018},
date = {2018-07-17},
volume = {18},
number = {3},
pages = {551--575},
publisher = {Springer Science and Business Media LLC},
abstract = {The emergence of large-scale social media systems, such as Wikipedia, Facebook, and Twitter, has given rise to a new multi-disciplinary effort based around the concept of social machines. For the most part, this research effort has limited its attention to the study of Web-based systems. It has also, perhaps unsurprisingly, tended to highlight the social scientific relevance of such systems. The present paper seeks to expand the scope of the social machine research effort to encompass the Internet of Things. One advantage of this expansion is that it helps to reveal some of the links between the science of social machines and the sciences of the mind. A second advantage is that it furthers our conceptual understanding of social machines and supports the quest to derive a philosophically-robust definition of the term "social machine." The results of the present analysis suggest that social machines are best conceived as systems in which a combination of social and technological elements play a role in the mechanistic realization of system-level phenomena. The analysis also highlights the relevance of cognitive science and the philosophy of mind to our general understanding of systems that transcend the cyber, physical, and social domains.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
173. Montanaro, Umberto; Dixit, Shilp; Fallah, Saber; Dianati, Mehrdad; Stevens, Alan; Oxtoby, David; Mouzakitis, Alexandros: Towards connected autonomous driving: review of use-cases. In: vol. 57, no. 6, pp. 779–814, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-montanaro_towards_2018,
title = {Towards connected autonomous driving: review of use-cases},
author = {Umberto Montanaro and Shilp Dixit and Saber Fallah and Mehrdad Dianati and Alan Stevens and David Oxtoby and Alexandros Mouzakitis},
url = {https://doi.org/10.1080%2F00423114.2018.1492142},
doi = {10.1080/00423114.2018.1492142},
year = {2018},
date = {2018-07-09},
volume = {57},
number = {6},
pages = {779--814},
publisher = {Informa UK Limited},
abstract = {Connected autonomous vehicles are considered as mitigators of issues such as traffic congestion, road safety, inefficient fuel consumption and pollutant emissions that current road transportation system suffers from. Connected autonomous vehicles utilise communication systems to enhance the performance of autonomous vehicles and consequently improve transportation by enabling cooperative functionalities, namely, cooperative sensing and cooperative manoeuvring. The former refers to the ability to share and fuse information gathered from vehicle sensors and road infrastructures to create a better understanding of the surrounding environment while the latter enables groups of vehicles to drive in a co-ordinated way which ultimately results in a safer and more efficient driving environment. However, there is a gap in understanding how and to what extent connectivity can contribute to improving the efficiency, safety and performance of autonomous vehicles. Therefore, the aim of this paper is to investigate the potential benefits that can be achieved from connected autonomous vehicles through analysing five use-cases: (i) vehicle platooning, (ii) lane changing, (iii) intersection management, (iv) energy management and (v) road friction estimation. The current paper highlights that although connectivity can enhance the performance of autonomous vehicles and contribute to the improvement of current transportation system performance, the level of achievable benefits depends on factors such as the penetration rate of connected vehicles, traffic scenarios and the way of augmenting off-board information into vehicle control systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
174. Zhu, Huanzhou; Gu, Zhuoer; Zhao, Haiming; Chen, Keyang; Li, Chang-Tsun; He, Ligang: Developing a pattern discovery method in time series data and its GPU acceleration. In: vol. 1, no. 4, pp. 266–283, 2018, ISSN: 2096-0654. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-zhu_developing_2018,
title = {Developing a pattern discovery method in time series data and its GPU acceleration},
author = {Huanzhou Zhu and Zhuoer Gu and Haiming Zhao and Keyang Chen and Chang-Tsun Li and Ligang He},
url = {https://doi.org/10.26599%2Fbdma.2018.9020021},
doi = {10.26599/bdma.2018.9020021},
issn = {2096-0654},
year = {2018},
date = {2018-07-02},
volume = {1},
number = {4},
pages = {266--283},
publisher = {Tsinghua University Press},
abstract = {The Dynamic Time Warping (DTW) algorithm is widely used in finding the global alignment of time series. Many time series data mining and analytical problems can be solved by the DTW algorithm. However, using the DTW algorithm to find similar subsequences is computationally expensive or unable to perform accurate analysis. Hence, in the literature, the parallelisation technique is used to speed up the DTW algorithm. However, due to the nature of DTW algorithm, parallelizing this algorithm remains an open challenge. In this paper, we first propose a novel method that finds the similar local subsequence. Our algorithm first searches for the possible start positions of subsequence, and then finds the best-matching alignment from these positions. Moreover, we parallelize the proposed algorithm on GPUs using CUDA and further propose an optimization technique to improve the performance of our parallelization implementation on GPU. We conducted the extensive experiments to evaluate the proposed method. Experimental results demonstrate that the proposed algorithm is able to discover time series subsequences efficiently and that the proposed GPU-based parallelization technique can further speedup the processing.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
175. Yuan, Hu; Maple, Carsten; Chen, Chao; Watson, Tim: Cross-device tracking through identification of user typing behaviours. In: vol. 54, no. 15, pp. 957–959, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-yuan_cross_2018,
title = {Cross-device tracking through identification of user typing behaviours},
author = {Hu Yuan and Carsten Maple and Chao Chen and Tim Watson},
url = {https://doi.org/10.1049%2Fel.2018.0893},
doi = {10.1049/el.2018.0893},
year = {2018},
date = {2018-07-01},
volume = {54},
number = {15},
pages = {957--959},
publisher = {Institution of Engineering and Technology (IET)},
abstract = {A novel method of cross-device tracking based on user typing behaviours is presented. Compared with existing methods, typing behaviours can offer greater security and efficiency. When people type on their devices, a number of different factors may be considered to identify users, such as the angle and distance of contact point to the centre of the target character, the time elapsed between two typing actions and the physical force exerted on the device (which can be measured by an accelerometer). An experiment was conducted to validate the proposed model; those data are collected through an Android App developed for the purpose of this study. By collecting a reasonable amount of this type of data, it is shown that machine learning algorithms can be employed to first classify different users and subsequently authenticate users across devices.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
176. Xia, Hui; He, Ligang; Wang, Bin; Chang, Cheng; Han, Xie; Maple, Carsten: Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-xia_developing_2018,
title = {Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices},
author = {Hui Xia and Ligang He and Bin Wang and Cheng Chang and Xie Han and Carsten Maple},
url = {https://doi.org/10.1109%2Fhpcc%2Fsmartcity%2Fdss.2018.00086},
doi = {10.1109/hpcc/smartcity/dss.2018.00086},
year = {2018},
date = {2018-06-28},
booktitle = {2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)},
publisher = {IEEE},
abstract = {Mobile devices, such as smartphones, offer people great convenience in accessing information and computation resources. However, mobile devices remain relatively limited in terms of computing, memory and energy capacity when compared with desktop machines. A promising solution to mitigate these limitations is to enhance the services mobile devices can provide by utilizing powerful cloud platforms through offloading mechanisms, i.e., offloading the heavy information processing tasks from mobile devices to the Cloud. This paper addresses this issue by developing two offloading-enabled application development frameworks by adapting certain Android OS interfaces. The applications developed using these frameworks will be equipped with offloading capability. In the first framework, each application is selfish and makes offloading decisions independently, whereas in the second, a central offloading manager resides in the mobile device and is responsible for making the offloading decisions for all applications. The two frameworks are designed in a way that application developers only need to make minimal changes to their programming behavior. Experiments have been conducted that verify the feasibility and effectiveness of the offloading mechanisms that are proposed.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
177. Payer, Mathias; Rashid, Awais; Such, Jose M. (Ed.): Engineering Secure Software and Systems. Springer International Publishing, 2018. (Type: Proceeding | Links | BibTeX | Altmetric) @proceedings{proc-payer_engineering_2018,
title = {Engineering Secure Software and Systems},
editor = {Mathias Payer and Awais Rashid and Jose M. Such},
url = {https://doi.org/10.1007%2F978-3-319-94496-8},
doi = {10.1007/978-3-319-94496-8},
year = {2018},
date = {2018-06-26},
publisher = {Springer International Publishing},
keywords = {},
pubstate = {published},
tppubtype = {proceedings}
}
178. Tsekleves, Emmanuel; Cooper, Rachel: Design Research Opportunities in the Internet of Health Things: a review of reviews. In: Design as a catalyst for change - DRS International Conference 2018, Design Research Society, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tsekleves_design_2018,
title = {Design Research Opportunities in the Internet of Health Things: a review of reviews},
author = {Emmanuel Tsekleves and Rachel Cooper},
url = {https://doi.org/10.21606%2Fdrs.2018.288},
doi = {10.21606/drs.2018.288},
year = {2018},
date = {2018-06-25},
booktitle = {Design as a catalyst for change - DRS International Conference 2018},
publisher = {Design Research Society},
abstract = {This paper charts the challenges and opportunities for design research in the Internet of Health Things (IoHT), by conducting a systematic review of review papers. The Internet of Things (IoT) is already impacting health services and could be the basis for a new healthcare paradigm in the near future. Thus there is a need to engage more designers and design researchers in actively shaping the next generation of development and deployment of IoT in health and care. Following a systematic review of the literature, we present key emerging themes, where design can add value and make a significant contribution to this field. Our findings indicate eight key challenges, which provide several opportunities for design researchers who wish to contribute and lead research in the field of IoHT.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
179. Akmal, Haider Ali; Coulton, Paul: Using Heterotopias to Characterise Interactions in Physical/Digital Spaces. In: Design as a catalyst for change - DRS International Conference 2018, Design Research Society, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-akmal_using_2018,
title = {Using Heterotopias to Characterise Interactions in Physical/Digital Spaces},
author = {Haider Ali Akmal and Paul Coulton},
url = {https://doi.org/10.21606%2Fdrs.2018.348},
doi = {10.21606/drs.2018.348},
year = {2018},
date = {2018-06-25},
booktitle = {Design as a catalyst for change - DRS International Conference 2018},
publisher = {Design Research Society},
abstract = {This paper addresses the complexity of designing interactions in hybrid digital/physical spaces, in which notions of public and private are becoming increasingly blurred, by using a philosophical lens to characterise such spaces. In particular it references the ideas presented by Michel Foucault in his essay "Of Other Spaces". It proposes the presence of a spatial division within physical and virtual, in terms of private and public, and juxtaposes them through a Heterotopical Model for Inter-Spatial Interaction through which designers can examine the coexistence of physical and digital interactions. The purpose of modelling this juxtaposition is to help designers understand the nature of connections that happen between physical and digital objects in these spaces and consider how meaningful interactions can respond to this complexity.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
180. Lindley, Joseph Galen; Coulton, Paul; Akmal, Haider: Turning Philosophy with a Speculative Lathe: Object Oriented Ontology, Carpentry, and Design Fiction. In: Storni, Cristiano; Leahy, Keelin; McMahon, Muireanne; Lloyd, Peter; Bohemia, Erik (Ed.): Proceedings of the Design Research Society Conference 2018, pp. 229–243, Design Research Society, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lindley_turning_2018,
title = {Turning Philosophy with a Speculative Lathe: Object Oriented Ontology, Carpentry, and Design Fiction},
author = {Joseph Galen Lindley and Paul Coulton and Haider Akmal},
editor = {Cristiano Storni and Keelin Leahy and Muireanne McMahon and Peter Lloyd and Erik Bohemia},
url = {http://www.drs2018limerick.org},
doi = {10.21606/dma.2018.327},
year = {2018},
date = {2018-06-25},
booktitle = {Proceedings of the Design Research Society Conference 2018},
volume = {1},
pages = {229--243},
publisher = {Design Research Society},
series = {Design Research Society Conference Proceedings 2018},
abstract = {Arising from the complex relationship between their physical affordances, digital shadows, and interconnections, the things which make up the 'Internet of Things' (the IoT) present designers, users, and society at large, with a range of unique and as-yet-unfamiliar forms of network-contingent agency. These new design spaces engender new forms network anxiety, that in turn can result in a range of ill effects including overstimulation, information overload, and paranoia. Contemporary philosophies of technology provide a theoretical base with which designers can temper these emergent techno-anxieties with a sort of scholarly comfort blanket, however, closing the loop between such theories and design practice so that one explicitly informs the other remains a rarely-tackled and elusive challenge within design research. To help explore how designers may underpin their practice with philosophical foundations, in this paper we recount our own experience of conducting an IoT-based Speculative Design project. This research attempts to encode, enact, and express ideas derived from a contemporary philosophical movement\textemdashObject Oriented Ontology (OOO)\textemdashand 'Carpenter' those ideas into designed artefacts using the Design Fiction as World Building approach to Speculative Design. To 'turn' a physical material\textemdashwood, metal or plastic\textemdashmeans reshaping the material with a lathe to afford it a tangible elegance and grace. Metaphorically speaking, in this paper, OOO is our material and Design Fiction is our lathe, we reflect on the process of sculpting and carving theory, lending shape and poise to OOO through Design Fiction enabled Carpentry},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
181. Burns, Martin; Griffor, Edward; Balduccini, Marcello; Vishik, Claire; Huth, Michael; Wollman, David: Reasoning about Smart City. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-burns_reasoning_2018,
title = {Reasoning about Smart City},
author = {Martin Burns and Edward Griffor and Marcello Balduccini and Claire Vishik and Michael Huth and David Wollman},
url = {https://doi.org/10.1109%2Fsmartcomp.2018.00033},
doi = {10.1109/smartcomp.2018.00033},
year = {2018},
date = {2018-06-18},
booktitle = {2018 IEEE International Conference on Smart Computing (SMARTCOMP)},
publisher = {IEEE},
abstract = {Smart Cities are complex environments, comprising diverse cyber-physical systems (CPS), including Internet of Things (IoT). Smart Cities pose challenges of scale, integration, interoperability, sophisticated processes, governance, human elements. Trustworthiness (including safety, security, privacy, reliability and resilience) of these Smart Cities and their elements is critical for gaining broad adoption by the leadership and the public. The US National Institute of Standards and Technology (NIST) and its government, university and industry collaborators, have developed an approach to reasoning about CPS/IoT trustworthiness that can be applied to Smart Cities. The approach uses ontology and reasoning techniques, is based on the NIST Framework for Cyber-Physical Systems, and demonstrates how a greater understanding of the interdependencies between concerns (elements of the CPS Framework) can be achieved. To demonstrate capabilities of the approach in a short paper, we develop a public safety use case and show how reasoning can be used to analyze and validate the trustworthiness of elements of Smart Cities.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
182. Radanliev, Petar; Roure, David Charles De; Nurse, Jason R. C.; Nicolescu, Razvan; Huth, Michael; Cannady, Stacy; Montalvo, Rafael Mantilla: Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, Institution of Engineering and Technology, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-radanliev_integration_2018,
title = {Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-things in Industry 4.0},
author = {Petar Radanliev and David Charles De Roure and Jason R. C. Nurse and Razvan Nicolescu and Michael Huth and Stacy Cannady and Rafael Mantilla Montalvo},
doi = {10.1049/cp.2018.0041},
year = {2018},
date = {2018-06-14},
booktitle = {Living in the Internet of Things: Cybersecurity of the IoT - 2018},
publisher = {Institution of Engineering and Technology},
abstract = {This research article reports the results of a qualitative case study that correlates academic literature with five Industry 4.0 cyber trends, seven cyber risk frameworks and two cyber risk models. While there is a strong interest in industry and academia to standardise existing cyber risk frameworks, models and methodologies, an attempt to combine these approaches has not been done until present. We apply the grounded theory approach to derive with integration criteria for the reviewed frameworks, models and methodologies. Then, we propose a new architecture for the integration of the reviewed frameworks, models and methodologies. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of a holistic economic impact assessment model for IoT cyber risk.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
183. Beck, Sophie; Finney, Joe; Knowles, Brandin Hanson: How Freya built Sharkie: Initial explorations into the safety, security and privacy concerns of children's IoT devices. In: London Computing Education Research Symposion, King's College London, UK, 2018. (Type: Inproceedings | Abstract | Links | BibTeX) @inproceedings{proc-in-beck_how_2018,
title = {How Freya built Sharkie: Initial explorations into the safety, security and privacy concerns of children's IoT devices},
author = {Sophie Beck and Joe Finney and Brandin Hanson Knowles},
url = {https://cerc.kcl.ac.uk/wp-content/uploads/sites/314/2018/06/Conference-booklet_final.pdf},
year = {2018},
date = {2018-06-11},
booktitle = {London Computing Education Research Symposion, King's College London, UK},
abstract = {There are many benefits for children interacting with Internet of Things technology, which is exemplified by the popularity of physical computing in education. However, there is a need to explore the risks that are likely to emerge as children become ever-more exposed to IoT technology [1,2]. Through exploring the possible privacy, safety and security risks that children might encounter, new ways in which children can be educated around these risks can be identified.
This presentation reports on the findings from the first stage of IoT4Kids, which is a one year PETRAS project in partnership with The Micro:bit Foundation, NSPCC and FOSI. The project draws on children's imagined uses of the BBC micro:bit, which is an IoT device designed with the intent to engage children with programming and computing. It will also highlight how these findings are informing future research.
This presentation highlights the key findings of two workshops with primary school children (aged 9-11) which captured the children's imagined uses of the micro:bit and a Team and Stakeholder Workshop, which explored the children's use cases in relation to how children might realise some of their designs and possible risks which may emerge from children building their designs.
The data analysis from the first stage produced three high-level use categories; Assistance, Play and Companionship. Within each high-level use category, two initial speculative use scenarios were developed in order to inform the second stage of the project. These speculative use cases drew on the data collected from the events, as well as desk research drawing on current knowledge on known risks regarding online safety for children [3,4]. This resulted in the production of narratives of imagined children which included; their motivations for building an IoT device, how they built their design, and the possible risks that they might encounter during the build and use of their device.
Our study highlighted that a high proportion of children desire assistance technology, most likely influenced by their exposure to current IoT technologies. Whilst some of the more simplistic designs pose low risks, there was a proportion which highlighted children's desires for tracking and surveillance. A number of girls highlighted the desire for technology to be utilised for companionship purposes, combatting loneliness and provide a mechanism for emotional support. These designs related to capabilities available in IoT 'connected toys', whereby a child's favourite toy will respond to their questions and emotions.
A smaller proportion of boys highlighted their desire for risky play. Such examples included pranking, whereby IoT devises could be utilised to elicit fear in others, such as switching lights on and off in order to scare siblings. Based on the findings, use scenarios have been developed such as Freya who builds 'Sharkie' her own connected toy. Through this process a number of possible risks have been highlighted to explore further in the second stage of the project.
Future work aims to draw on this current study in order to design and create workshops-in-a-box. The aim of these resources will be to educate children around the potentials that they might encounter whilst programming IoT devices. These will include educational resources to support teachers in the exploration of IoT technologies when delivering the computing curriculum. The vision is to develop innovative approaches for delivering physical computing education, whilst raising awareness of safety, security and privacy concerns associated with children's interaction with IoT technologies.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
This presentation reports on the findings from the first stage of IoT4Kids, which is a one year PETRAS project in partnership with The Micro:bit Foundation, NSPCC and FOSI. The project draws on children's imagined uses of the BBC micro:bit, which is an IoT device designed with the intent to engage children with programming and computing. It will also highlight how these findings are informing future research.
This presentation highlights the key findings of two workshops with primary school children (aged 9-11) which captured the children's imagined uses of the micro:bit and a Team and Stakeholder Workshop, which explored the children's use cases in relation to how children might realise some of their designs and possible risks which may emerge from children building their designs.
The data analysis from the first stage produced three high-level use categories; Assistance, Play and Companionship. Within each high-level use category, two initial speculative use scenarios were developed in order to inform the second stage of the project. These speculative use cases drew on the data collected from the events, as well as desk research drawing on current knowledge on known risks regarding online safety for children [3,4]. This resulted in the production of narratives of imagined children which included; their motivations for building an IoT device, how they built their design, and the possible risks that they might encounter during the build and use of their device.
Our study highlighted that a high proportion of children desire assistance technology, most likely influenced by their exposure to current IoT technologies. Whilst some of the more simplistic designs pose low risks, there was a proportion which highlighted children's desires for tracking and surveillance. A number of girls highlighted the desire for technology to be utilised for companionship purposes, combatting loneliness and provide a mechanism for emotional support. These designs related to capabilities available in IoT 'connected toys', whereby a child's favourite toy will respond to their questions and emotions.
A smaller proportion of boys highlighted their desire for risky play. Such examples included pranking, whereby IoT devises could be utilised to elicit fear in others, such as switching lights on and off in order to scare siblings. Based on the findings, use scenarios have been developed such as Freya who builds 'Sharkie' her own connected toy. Through this process a number of possible risks have been highlighted to explore further in the second stage of the project.
Future work aims to draw on this current study in order to design and create workshops-in-a-box. The aim of these resources will be to educate children around the potentials that they might encounter whilst programming IoT devices. These will include educational resources to support teachers in the exploration of IoT technologies when delivering the computing curriculum. The vision is to develop innovative approaches for delivering physical computing education, whilst raising awareness of safety, security and privacy concerns associated with children's interaction with IoT technologies.184. Berthelot, Melissa; Lo, Benny P. L.; Yang, Guang-Zhong; Leff, Daniel: Pilot study: Free flap monitoring using a new tissue oxygen saturation (StO2) device. In: vol. 44, no. 6, pp. 900, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-berthelot_pilot_2018,
title = {Pilot study: Free flap monitoring using a new tissue oxygen saturation (StO2) device},
author = {Melissa Berthelot and Benny P. L. Lo and Guang-Zhong Yang and Daniel Leff},
url = {https://doi.org/10.1016%2Fj.ejso.2018.02.166},
doi = {10.1016/j.ejso.2018.02.166},
year = {2018},
date = {2018-06-01},
volume = {44},
number = {6},
pages = {900},
publisher = {Elsevier BV},
abstract = {Autologous free flap breast reconstruction is becoming increasingly common following mastectomy, owing to the natural appearance, cosmetic outcome and durability. The first 24 - 48hrs after surgery are crucial to determine the viability of the flap for which failure is highly morbid. Currently, assessment of flap viability primarily relies on clinical observations. Biophysical and biochemical devices were developed for continuous monitoring, but suffer reliability, accuracy and usability issues.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
185. Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Tun, Thein Than; Nuseibeh, Bashar; Rashid, Awais: Towards forensic-ready software systems. In: ICSE-NIER '18: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pasquale_towards_2018,
title = {Towards forensic-ready software systems},
author = {Liliana Pasquale and Dalal Alrajeh and Claudia Peersman and Thein Than Tun and Bashar Nuseibeh and Awais Rashid},
url = {https://doi.org/10.1145%2F3183399.3183426},
doi = {10.1145/3183399.3183426},
year = {2018},
date = {2018-05-27},
booktitle = {ICSE-NIER '18: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results},
publisher = {ACM},
abstract = {As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little or no attention has been given to how well-suited existing software engineering methodologies and practices are for the systematic development of such systems. In this paper, we consider the meaning of forensic readiness of software, define forensic readiness requirements, and highlight some of the open software engineering challenges in the face of forensic readiness. We use a real software system developed to investigate online sharing of child abuse media to illustrate the presented concepts.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
186. Binns, Reuben Daniel; Lyngs, Ulrik; Kleek, Max Goodwin Van; Zhao, Jun; Libert, Timothy; Shadbolt, Nigel R.: Third Party Tracking in the Mobile Ecosystem. In: WebSci '18: Proceedings of the 10th ACM Conference on Web Science, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-binns_third_2018,
title = {Third Party Tracking in the Mobile Ecosystem},
author = {Reuben Daniel Binns and Ulrik Lyngs and Max Goodwin Van Kleek and Jun Zhao and Timothy Libert and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3201064.3201089},
doi = {10.1145/3201064.3201089},
year = {2018},
date = {2018-05-15},
booktitle = {WebSci '18: Proceedings of the 10th ACM Conference on Web Science},
publisher = {ACM},
abstract = {Third party tracking allows companies to identify users and track their behaviour across multiple digital services. This paper presents an empirical study of the prevalence of third-party trackers on 959,000 apps from the US and UK Google Play stores. We find that most apps contain third party tracking, and the distribution of trackers is long-tailed with several highly dominant trackers accounting for a large portion of the coverage. The extent of tracking also differs between categories of apps; in particular, news apps and apps targeted at children appear to be amongst the worst in terms of the number of third party trackers associated with them. Third party tracking is also revealed to be a highly trans-national phenomenon, with many trackers operating in jurisdictions outside the EU. Based on these findings, we draw out some significant legal compliance challenges facing the tracking industry.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
187. Craggs, Barnaby: A Trustworthy IoT?. 2018. (Type: Miscellaneous | Abstract | Links | BibTeX) @misc{misc-craggs_trustworthy_2018,
title = {A Trustworthy IoT?},
author = {Barnaby Craggs},
url = {https://iotuk.org.uk/a-trustworthy-iot/},
year = {2018},
date = {2018-05-11},
abstract = {As we move towards the exciting future of connected everythings - full of promise and potential for economic value and social good - perhaps this is the time to take a step back and realise that it is by no mistake that the IoT is often referred to as the 'Internet of Sh*t'[1]. There is a lack of trust in these connected devices, and it is often for good reason.},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
188. Mittelstadt, Brent; Benzler, Justus; Engelmann, Lukas; Prainsack, Barbara; Vayena, Effy: Is There a Duty to Participate in Digital Epidemiology?. In: vol. 14, no. 1, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mittelstadt_is_2018,
title = {Is There a Duty to Participate in Digital Epidemiology?},
author = {Brent Mittelstadt and Justus Benzler and Lukas Engelmann and Barbara Prainsack and Effy Vayena},
doi = {10.1186/s40504-018-0074-1},
year = {2018},
date = {2018-05-09},
volume = {14},
number = {1},
publisher = {Springer Science and Business Media LLC},
abstract = {This paper poses the question of whether people have a duty to participate in digital epidemiology. While an implied duty to participate has been argued for in relation to biomedical research in general, digital epidemiology involves processing of non-medical, granular and proprietary data types that pose different risks to participants. We first describe traditional justifications for epidemiology that imply a duty to participate for the general public, which take account of the immediacy and plausibility of threats, and the identifiability of data. We then consider how these justifications translate to digital epidemiology, understood as an evolution of traditional epidemiology that includes personal and proprietary digital data alongside formal medical datasets. We consider the risks imposed by re-purposing such data for digital epidemiology and propose eight justificatory conditions that should be met in justifying a duty to participate for specific digital epidemiological studies. The conditions are then applied to three hypothetical cases involving usage of social media data for epidemiological purposes. We conclude with a list of questions to be considered in public negotiations of digital epidemiology, including the application of a duty to participate to third-party data controllers, and the important distinction between moral and legal obligations to participate in research.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
189. Mistry, Miten; D'Iddio, Andrea Callia; Huth, Michael; Misener, Ruth: Satisfiability modulo theories for process systems engineering. In: vol. 113, pp. 98–114, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mistry_satisfiability_2018,
title = {Satisfiability modulo theories for process systems engineering},
author = {Miten Mistry and Andrea Callia D'Iddio and Michael Huth and Ruth Misener},
url = {https://doi.org/10.1016%2Fj.compchemeng.2018.03.004},
doi = {10.1016/j.compchemeng.2018.03.004},
year = {2018},
date = {2018-05-08},
volume = {113},
pages = {98--114},
publisher = {Elsevier BV},
abstract = {Process systems engineers have long recognized the importance of both logic and optimization for automated decision-making. But modern challenges in process systems engineering could strongly benefit from methodological contributions in computer science. In particular, we propose satisfiability modulo theories (SMT) for process systems engineering applications. We motivate SMT using a series of test beds and show the applicability of SMT algorithms and implementations on (i) two-dimensional bin packing, (ii) model explainers, and (iii) mixed-integer nonlinear optimization solvers.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
190. Safa, Nader Sohrabi; Maple, Carsten; Watson, Tim; Furnell, Steve: Information security collaboration formation in organisations. In: vol. 12, no. 3, pp. 238–245, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-safa_information_2018,
title = {Information security collaboration formation in organisations},
author = {Nader Sohrabi Safa and Carsten Maple and Tim Watson and Steve Furnell},
url = {https://doi.org/10.1049%2Fiet-ifs.2017.0257},
doi = {10.1049/iet-ifs.2017.0257},
year = {2018},
date = {2018-05-01},
volume = {12},
number = {3},
pages = {238--245},
publisher = {Institution of Engineering and Technology (IET)},
abstract = {The protection of organisational information assets requires the collaboration of all employees; information security collaboration (ISC) aggregates the efforts of employees in order to mitigate the effect of information security breaches and incidents. However, it is acknowledged that ISC formation and its development needs more investigation. This research endeavours to show how ISC forms and develops in the context of an organisation based on social bond factors. The social bond theory and theory of planned behaviour describe the effect of social bond factors on the attitude of employees and finally their behaviour regarding collaboration in the domain of information security. The results of the data analysis reveal that personal norms, involvement, and commitment to their organisation significantly influence the employees' attitude towards ISC intention. However, contrary to the authors expectation, attachment does not influence the attitude of employees towards ISC. In addition, attitudes towards ISC, perceived behavioural control, and personal norms significantly affect the intention of employees towards ISC. The findings also show that the employees' intention towards ISC and organisational support positively influence ISC, but that trust does not significantly affect ISC behaviour.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
191. Breza, Michael J.; Tomić, Ivana; McCann, Julie A.: Failures from the Environment, a Report on the First FAILSAFE workshop. In: vol. 48, no. 2, pp. 40–45, 2018. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-breza_failures_2018,
title = {Failures from the Environment, a Report on the First FAILSAFE workshop},
author = {Michael J. Breza and Ivana Tomi\'{c} and Julie A. McCann},
url = {https://doi.org/10.1145%2F3213232.3213238},
doi = {10.1145/3213232.3213238},
year = {2018},
date = {2018-05-01},
volume = {48},
number = {2},
pages = {40--45},
publisher = {Association for Computing Machinery (ACM)},
abstract = {This document presents the views expressed in the submissions and discussions at the FAILSAFE workshop about the common problems that plague embedded sensor system deployments in the wild. We present analysis gathered from the submissions and the panel session of the FAILSAFE 2017 workshop held at the SenSys 2017 conference. The FAILSAFE call for papers specifically asked for descriptions of wireless sensor network (WSN) deployments and their problems and failures. The submissions, the questions raised at the presentations, and the panel discussion give us a sufficient body of work to review, and draw conclusions regarding the effect that the environment has as the most common cause of embedded sensor system failures.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
192. Kleek, Max Goodwin Van; Seymour, William; Veale, Michael; Binns, Reuben Daniel; Shadbolt, Nigel R.: The Need for Sensemaking in Networked Privacy and Algorithmic Responsibility. In: ACM Conference on Human Factors in Computing Systems (CHI'18), Montréal, Canada, 2018. (Type: Inproceedings | Abstract | Links | BibTeX) @inproceedings{proc-in-kleek_need_2018,
title = {The Need for Sensemaking in Networked Privacy and Algorithmic Responsibility},
author = {Max Goodwin Van Kleek and William Seymour and Michael Veale and Reuben Daniel Binns and Nigel R. Shadbolt},
url = {https://discovery.ucl.ac.uk/id/eprint/10046886/1/sensemaking-networked-privacy.pdf},
year = {2018},
date = {2018-04-22},
booktitle = {ACM Conference on Human Factors in Computing Systems (CHI'18), Montr\'{e}al, Canada},
abstract = {This paper proposes that two significant and emerging problems facing our connected, data-driven society may be more effectively solved by being framed as sensemaking challenges. The first is in empowering individuals to take control of their privacy, in device-rich information environments where personal information is fed transparently to complex networks of information brokers. Although sensemaking is often framed as an analytical activity undertaken by experts, due to the fact that non-specialist end-users are now being forced to make expert-like decisions in complex information environments, we argue that it is both appropriate and important to consider sensemaking challenges in this context. The second is in supporting human-in-the-loop algorithmic decision-making, in which important decisions bringing direct consequences for individuals, or indirect consequences for groups, are made with the support of data-driven algorithmic systems. In both privacy and algorithmic decision-making, framing the problems as sensemaking challenges acknowledges complex and illdefined problem structures, and affords the opportunity to view these activities as both building up relevant expertise schemas over time, and being driven potentially by recognition-primed decision making.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
193. Binns, Reuben Daniel; Kleek, Max Goodwin Van; Veale, Michael; Lyngs, Ulrik; Zhao, Jun; Shadbolt, Nigel R.: 'It's Reducing a Human Being to a Percentage': Perceptions of Justice in Algorithmic Decisions. In: CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-binns_its_2018,
title = {'It's Reducing a Human Being to a Percentage': Perceptions of Justice in Algorithmic Decisions},
author = {Reuben Daniel Binns and Max Goodwin Van Kleek and Michael Veale and Ulrik Lyngs and Jun Zhao and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3173574.3173951},
doi = {10.1145/3173574.3173951},
year = {2018},
date = {2018-04-21},
booktitle = {CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Data-driven decision-making consequential to individuals raises important questions of accountability and justice. Indeed, European law provides individuals limited rights to 'meaningful information about the logic' behind significant, autonomous decisions such as loan approvals, insurance quotes, and CV filtering. We undertake three experimental studies examining people's perceptions of justice in algorithmic decision-making under different scenarios and explanation styles. Dimensions of justice previously observed in response to human decision-making appear similarly engaged in response to algorithmic decisions. Qualitative analysis identified several concerns and heuristics involved in justice perceptions including arbitrariness, generalisation, and (in)dignity. Quantitative analysis indicates that explanation styles primarily matter to justice perceptions only when subjects are exposed to multiple different styles---under repeated exposure of one style, scenario effects obscure any explanation effects. Our results suggests there may be no 'best' approach to explaining algorithmic decisions, and that reflection on their automated nature both implicates and mitigates justice dimensions.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
194. Kleek, Max Goodwin Van; Binns, Reuben Daniel; Zhao, Jun; Slack, Adam; Lee, Sauyon; Ottewell, Dean; Shadbolt, Nigel R.: X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps. In: CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kleek_x_2018,
title = {X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps},
author = {Max Goodwin Van Kleek and Reuben Daniel Binns and Jun Zhao and Adam Slack and Sauyon Lee and Dean Ottewell and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3173574.3173967},
doi = {10.1145/3173574.3173967},
year = {2018},
date = {2018-04-21},
booktitle = {CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Most smartphone apps collect and share information with various first and third parties; yet, such data collection practices remain largely unbeknownst to, and outside the control of, end-users. In this paper, we seek to understand the potential for tools to help people refine their exposure to third parties, resulting from their app usage. We designed an interactive, focus-plus-context display called X-Ray Refine (Refine) that uses models of over 1 million Android apps to visualise a person's exposure profile based on their durations of app use. To support exploration of mitigation strategies, emphRefine can simulate actions such as app usage reduction, removal, and substitution. A lab study of emphRefine found participants achieved a high-level understanding of their exposure, and identified data collection behaviours that violated both their expectations and privacy preferences. Participants also devised bespoke strategies to achieve privacy goals, identifying the key barriers to achieving them.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
195. Elsden, Chris; Manohar, Arthi Kanchana; Briggs, Jo; Harding, Mike; Speed, Chris; Vines, John: Making Sense of Blockchain Applications: A Typology for HCI. In: CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-elsden_making_2018,
title = {Making Sense of Blockchain Applications: A Typology for HCI},
author = {Chris Elsden and Arthi Kanchana Manohar and Jo Briggs and Mike Harding and Chris Speed and John Vines},
url = {https://doi.org/10.1145%2F3173574.3174032},
doi = {10.1145/3173574.3174032},
year = {2018},
date = {2018-04-21},
booktitle = {CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Blockchain is an emerging infrastructural technology that is proposed to fundamentally transform the ways in which people transact, trust, collaborate, organize and identify themselves. In this paper, we construct a typology of emerging blockchain applications, consider the domains in which they are applied, and identify distinguishing features of this new technology. We argue that there is a unique role for the HCI community in linking the design and application of blockchain technology towards lived experience and the articulation of human values. In particular, we note how the accounting of transactions, a trust in immutable code and algorithms, and the leveraging of distributed crowds and publics around vast interoperable databases all relate to longstanding issues of importance for the field. We conclude by highlighting core conceptual and methodological challenges for HCI researchers beginning to work with blockchain and distributed ledger technologies.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
196. Tallyn, Ella; Fried, Hector; Gianni, Rory; Isard, Amy; Speed, Chris: The Ethnobot: Gathering Ethnographies in the Age of IoT. In: CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tallyn_ethnobot_2018,
title = {The Ethnobot: Gathering Ethnographies in the Age of IoT},
author = {Ella Tallyn and Hector Fried and Rory Gianni and Amy Isard and Chris Speed},
url = {https://doi.org/10.1145%2F3173574.3174178},
doi = {10.1145/3173574.3174178},
year = {2018},
date = {2018-04-21},
booktitle = {CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Computational systems and objects are becoming increasingly closely integrated with our daily activities. Ubiquitous and pervasive computing first identified the emerging challenges of studying technology used on-the-move and in widely varied contexts. With IoT, previously sporadic experiences are interconnected across time and space in numerous and complex ways. This increasing complexity has multiplied the challenges facing those who study human experience to inform design. This paper describes the results of a study that used a chatbot or 'Ethnobot' to gather ethnographic data, and considers the opportunities and challenges in collecting this data in the absence of a human ethnographer. This study involved 13 participants gathering information about their experiences at the Royal Highland Show. We demonstrate the effectiveness of the Ethnobot in this setting, discuss the benefits and drawbacks of chatbots as a tool for ethnographic data collection, and conclude with recommendations for the design of chatbots for this purpose.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
197. Seymour, William: How loyal is your Alexa?. In: CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-seymour_how_2018,
title = {How loyal is your Alexa?},
author = {William Seymour},
url = {https://doi.org/10.1145%2F3170427.3180289},
doi = {10.1145/3170427.3180289},
year = {2018},
date = {2018-04-20},
booktitle = {CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Smart assistants are the current must-have device in the home. Currently available products do little to respect the autonomy and privacy of end users, but it doesn't have to be this way. My research explores a speculative 'respectful' assistant which is more socially aware, and treats its users in a more nuanced way than occurs at present. Mixing computer science, philosophy, and art, the project uses a combination of user studies and technical comparison to discover a potential future for the smart digital assistant.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
198. Nissen, Bettina; Pschetz, Larissa; Murray-Rust, Dave; Mehrpouya, Hadi; Oosthuizen, Shaune; Speed, Chris: GeoCoin: Supporting Ideation and Collaborative Design with Smart Contracts. In: CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-nissen_geocoin_2018,
title = {GeoCoin: Supporting Ideation and Collaborative Design with Smart Contracts},
author = {Bettina Nissen and Larissa Pschetz and Dave Murray-Rust and Hadi Mehrpouya and Shaune Oosthuizen and Chris Speed},
url = {https://doi.org/10.1145%2F3173574.3173737},
doi = {10.1145/3173574.3173737},
year = {2018},
date = {2018-04-19},
booktitle = {CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Design and HCI researchers are increasingly working with complex digital infrastructures, such as cryptocurrencies, distributed ledgers and smart contracts. These technologies will have a profound impact on digital systems and their audiences. However, given their emergent nature and technical complexity, involving non-specialists in the design of applications that employ these technologies is challenging. In this paper, we discuss these challenges and present GeoCoin, a location-based platform for embodied learning and speculative ideating with smart contracts. In collaborative workshops with GeoCoin, participants engaged with location-based smart contracts, using the platform to explore digital 'debit' and 'credit' zones in the city. These exercises led to the design of diverse distributed-ledger applications, for time-limited financial unions, participatory budgeting, and humanitarian aid. These results contribute to the HCI community by demonstrating how an experiential prototype can support understanding of the complexities behind new digital infrastructures and facilitate participant engagement in ideation and design processes.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
199. Cormode, Graham; Kulkarni, Tejas; Srivastava, Divesh: Constrained Private Mechanisms for Count Data. In: 2018 IEEE 34th International Conference on Data Engineering (ICDE), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-cormode_constrained_2018,
title = {Constrained Private Mechanisms for Count Data},
author = {Graham Cormode and Tejas Kulkarni and Divesh Srivastava},
url = {https://doi.org/10.1109%2Ficde.2018.00081},
doi = {10.1109/icde.2018.00081},
year = {2018},
date = {2018-04-16},
booktitle = {2018 IEEE 34th International Conference on Data Engineering (ICDE)},
publisher = {IEEE},
abstract = {Concern about how to aggregate sensitive user data without compromising individual privacy is a major barrier to greater availability of data. Differential privacy has emerged as an accepted model to release sensitive information while giving a statistical guarantee for privacy. Many different algorithms are possible to address different target functions. We focus on the core problem of count queries, and seek to design mechanisms to release data associated with a group of n individuals. Prior work has focused on designing mechanisms by raw optimization of a loss function, without regard to the consequences on the results. This can leads to mechanisms with undesirable properties, such as never reporting some outputs (gaps), and overreporting others (spikes). We tame these pathological behaviors by introducing a set of desirable properties that mechanisms can obey. Any combination of these can be satisfied by solving a linear program (LP) which minimizes a cost function, with constraints enforcing the properties. We focus on a particular cost function, and provide explicit constructions that are optimal for certain combinations of properties, and show a closed form for their cost. In the end, there are only a handful of distinct optimal mechanisms to choose between: one is the well-known (truncated) geometric mechanism; the second a novel mechanism that we introduce here, and the remainder are found as the solution to particular LPs. These all avoid the bad behaviors we identify. We demonstrate in a set of experiments on real and synthetic data which is preferable in practice, for different combinations of data distributions, constraints, and privacy parameters.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
200. Hadian, Ali; Heinis, Thomas: Towards Batch-Processing on Cold Storage Devices. In: 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW), IEEE, 2018. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-hadian_towards_2018,
title = {Towards Batch-Processing on Cold Storage Devices},
author = {Ali Hadian and Thomas Heinis},
url = {https://doi.org/10.1109%2Ficdew.2018.00028},
doi = {10.1109/icdew.2018.00028},
year = {2018},
date = {2018-04-16},
booktitle = {2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW)},
publisher = {IEEE},
abstract = {Large amounts of data in storage systems is cold, i.e., Written Once and Read Occasionally (WORO). The rapid growth of massive-scale archival and historical data increases the demand for petabyte-scale cheap storage for such cold data. A Cold Storage Device (CSD) is a disk-based storage system which is designed to trade off performance for cost and power efficiency. Inevitably, the design restrictions used in CSD's results in performance limitations. These limitations are not a concern for WORO workloads, however, the very low price/performance characteristics of CSDs makes them interesting for other applications, e.g., batch processes, too. Applications, however, can be very slow on CSD's if they do not take their characteristics into account. In this paper we design two strategies for data partitioning in CSDs -- a crucial operation in many batch analytics tasks like hash-join, near-duplicate detection, and data localization. We show that our strategies can efficiently use CSDs for batch processing of terabyte-scale data by accelerating data partitioning by 3.5x in our experiments.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}