The new era of consumption and change in the behavior of people in developing countries that we facing in recent decades has made not only the energy sector but also all resource suppliers in different sectors not to fulfill the demand in the field. The electricity, which is one of the main power resources, has become one of the major issues to be overcome for the governments. Predicting the future energy demand is always the most valuable information to achieve any success in many sectors. In this paper, a daily forecasting of the maximum energy demand in Kurdistan region of Iraq is investigated based on an artificial natural network and sliding window techniques. The standard mean absolute percentage error method is used to evaluate the accuracy of forecasting models.
Drawing on a series of in-depth interviews and statistical analysis of policy reports and documents, this paper examines how African nation states interact with Internet governance at the international level. There is a dominant paradigm at work that values the multistakeholder approach and encourages dialogue and equal representation. While, in principle, this model has developed for the good of all participating countries, we illuminate tensions and incongruities experienced by African nation states. We use three analytical frames that focus on the way countries are measured and ranked as ICT ready - what we refer to as accumulating evaluative value, the forms of resistance that emerge in order to counter the universalising values of Internet governance, and the way spatial geographies of internet use and access are mapped out politically. We draw attention to a paradox of stakeholder participation arguing that African nations experience continual disempowerment and alienation in their compliance with international directives.
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a Privacy Impact Assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and Personally Identifiable Information (PII) that may occur during the dynamic life-cycle of systems. In this paper, we propose a cyber and privacy risk management toolkit, called AMBIENT (AutoMated cyBer and prIvacy risk managEmeNt Toolkit) that addresses the above challenges by implementing and integrating three distinct software tools. AMBIENT not only assesses cyber and privacy risks in a thorough and automated manner but it also offers decision-support capabilities, to recommend optimal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit, in the academic literature, that brings together the aforementioned capabilities. To demonstrate its use, we have created a case scenario based on information about cyber attacks we have received from a healthcare organisation, as a reference sector that faces critical cyber and privacy threats.
Introduction This was a feasibility pilot study aiming to develop and validate an activity recognition system based on a custom-made body-fixed sensor and driven by an algorithm for recognising basic kinetic movements in military personnel. The findings of this study are deemed essential in informing our development process and contributing to our ultimate aim which is to develop a low-cost and easy-to-use body-fixed sensor for military applications. Methods Fifty military participants performed a series of trials involving walking, running and jumping under laboratory conditions in order to determine the optimal, among five machine learning (ML), classifiers. Thereafter, the accuracy of the classifier was tested towards the prediction of these movements (15 183 measurements) and in relation to participants' gender and fitness level. Results Random forest classifier showed the highest training and validation accuracy (98.5% and 92.9%, respectively) and classified participants with differences in type of activity, gender and fitness level with an accuracy level of 83.6%, 70.0% and 62.2%, respectively. Conclusions The study showed that accurate prediction of various dynamic activities can be achieved with high sensitivity using a low-cost easy-to-use sensor and a specific ML model. While this technique is in a development stage, our findings demonstrate that our body-fixed sensor prototype alongside a fully trained validated algorithm can strategically support military operations and offer valuable information to commanders controlling operations remotely. Further stages of our developments include the validation of our refined technique on a larger range of military activities and groups by combining activity data with physiological variables to predict phenomena relating to the onset of fatigue and performance decline.
This paper is going to discuss, what will be called, 'The Internet of Bodies'. Our physical and virtual worlds are blending and shifting our understanding of three key areas: (1) our identities are diversifying, as they become hyper-enhanced and multi-sensory; (2) our collaborations are co-created, immersive and connected; (3) our innovations are diverse and inclusive. It is proposed that our bodies have finally become the interface. This gives rise to salient research questions that will be addressed in this paper: - How do virtual forms of the body, created and transmitted through digital tools, change our relationship to ourselves and to others? - How does virtual/physical distributed embodiment redefine identity in socio-political terms? - Can working and living in virtual space enable and encourage collective intelligence, collaboration and co-creation? The last and key question looks to future insights : - How and with what effect will these collective virtual interactions be re-physicalised into the "real" world? The Internet of Bodies is Boddington's 4 year real-time and practise-led research programme (2016-2020) exploring the body's integration with digital technologies and its effect on human identity. Boddington disseminates this new knowledge to a diverse range of outlets (academic, creative industries, arts, educational, corporate) with a large audience reach in UK and internationally. This paper outlines insights gained from the outcomes this dissemination through her curatorial and practise-led research work, as well as post presentation debates from her presentations. It has been written in expansion and following keynotes presentations at University of Cambridge, UKRI Beyond Conference, Women in Games European Conference, Manchester Science Festival, Mobile World Congress and FutureFest amongst others. Boddington specialises in the future human, body responsive technologies and immersive experiences. She is Co-founder and Creative Director of body>data>space (fka shinaknsen), a pioneering interactive creative design collective who have advocated for the living body to be at the heart of the digital debate since the early 1990s. With a background in dance and performing arts and a long-term focus on the blending of our virtual and physical bodies, she engages in highly topical and future digital issues for our living bodies, including personal data usage, identity and representation of the self, connected body enhancements and collective connectivities of the future. One of the most exciting and yet also the most challenging debates of our times is that of the integration of automata, machine learning and AI into our daily existences. Boddington is a long term practise-led researcher and concept developer and well recognised for her pioneer work on virtual physical blending, body connectivity, virtual presence, redfinitions of liveness and the hyper-enhanced sensory self. Feeding from her practise Boddington presents and extends her original ideas into the public realm, for debate and evolution, to enable access by creative industries, education and cultural experts to the imperative questions about our identity, our self-hood and our agency in the future, as we move through considerable issues on data ethics and personal / bio-signal data which, in many cases, no longer belongs to us. 'The Internet of Bodies' has enabled Boddington research to become highly noticeable in a widening circuit, with challenging debates following her topical presentations, where industry and government are questioned on the owneership of our persoanl data. These have fed into Boddington's ever expanding research materials. This journal paper puts forward Boddington's ongoing reflections to these discussions. In 2017, Ghislaine was awarded the IX Immersion Experience Visionary Pioneer Award by Society for Arts and Technology (SAT) for her long-term innovative work in digital arts, and in particular her "passionate and inspirational engagement towards embodied intelligence". Boddington has been invited to present to a wide range of audiences in academia, creative industries and corporate contexts in the UK and internrationally 2016-2019. These range from small expert groupsings of 60 to huge corporate keynotes for up to 2k attendees:- 2019 - Keynote – 'The Internet of Bodies – body data and ethics' at UK Research and Innovation's Industrial Strategy conference 'BEYOND – AI and Creativity', Edinburgh, UK - Keynote – 'The Internet of Bodies – alive, collective and connected' at Women in Games European Conference, London, UK - Keynote Speaker – 'Internet of Bodies: Exploring the Future Human and Collective Engagement Scenarios' for 'Tacit Engagement in the Digital Age' Conference, University of Cambridge, UK - Keynote – 'Internet of Bodies – alive, connected and collective' for the House of Beautiful Business, Academy of Science, Lisbon, Portugal - Opening Keynote 'The Internet of Bodies – alive, connected and collective' and 'Biohacking on Stage Live Human Chip Implant Show' for Mobile World Congress / 4YFN (4 Years From Now), Barcelona, Spain 2018 - Keynote – 'Internet of Bodies – alive, connected and collective' for the House of Beautiful Business, Academy of Science, Lisbon, Portugal - Presentation and curation – 'Future humans: Augmented selves' and 'AI and Creativity Futures' for Nesta's FutureFest, London, UK - Presentation – Live Human Chip Implant Show 'You have been upgraded' for Manchester Science Festival, UK - Keynote – 'The Internet of Bodies' for the Simulation Training for Resilience & Safety Symposium, London, UK 2017 - Opening Keynote – 'The Internet on Bodies – alive, connected and collective' for Internet Mobile World, Bucharest, Romania - Keynote – 'Internet of Bodies – alive, connected and collective' for Manchester Science Festival, UK - Opening Keynote – 'Internet of Bodies' for IX Immersion Experience Symposium for SAT Dome, Montreal, Quebec - Presentation – 'Internet of Bodies – alive, connected and collective' for Thinking Digital, Newcastle, UK 2016 - Keynote Speaker and curation – 'Live Human Chip Implant Show' for Nesta's FutureFest, London, UK - Presentation – 'Women in Tech' for Telefonica Digital Futures, London, UK - Presentation – 'The Internet of Bodies – connected and collective' for Develop:Evolve VR conference, Brighton, UK - Keynote – 'The Internet of Bodies" for Market Research Council Conference, London, UK - Keynote - 'The Internet of Bodies' for HCC12 Conference, University of Salford Additonally Boddington has proposed and debated her insights on the Internet of Bodies into panels and in group discussions at Milano Digital Week, for Nesta Italia; Future Life, Utrecht; General Assembly London; V&A London; Imperial College London; London Tech Week; IX Immersion Experience SAT Montreal; King's College London; British Council; Toyota Europe; Market Research Society UK; Middlesex Univeristy, London; Convergence Festival London; Stylus London; Mapping Festival Geneva; FutureLab London; TEDx's Limassol and Vienna; Media Trendy Warsaw; BFI Sci-Fi Fest; ISEA; Crafts Council; Digital Catapult London Please see links below to a range of evidence for these presentations.
Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers "on the fly" ensuring their comfort. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Afterwards, a set of popular Machine Learning (ML) classification algorithms for risk-based authentication was tested and evaluated on the HuMIdb (Human Mobile Interaction database) dataset to identify the most appropriate ones for the proposed mechanism. The evaluation results demonstrated impact of overfitting (Accuracy: 1,0000) and therefore, we considered novelty detection algorithms to overcome this challenge and demonstrate high performance. To the best of our knowledge, this is the first time that novelty detection algorithms have been considered for risk-based adaptive user authentication showing promising results (OneClassSVM 0,9536, LOF 0,9740, KNN_average 0,9998).
The outbreak of the COVID-19 virus has caused widespread panic and global initiatives are geared towards treatment and limiting its spread. With technological advancements, several mechanisms and mobile applications have been developed that attempt to trace the physical contact made by a person with someone who has been tested COVID-19 positive. While designing these apps, user's privacy has been an afterthought and has resulted in mass violations of privacy of the public and the patients. A total of 32 countries have designed apps and rely on them as a strategy to flatten the pandemic curve. Along with lack of privacy, these methodologies are centralized, where they are fully controlled by the government and the healthcare providers. Owing to these and many other concerns, people are hesitant in the adoption of these technologies. This paper presents a detailed analysis of user tracking apps belonging to 32 countries, thus demonstrating that they collect personal data and are a gross violation of user privacy. This paper presents a novel architecture for the efficient, effective and privacy-preserving contact tracing of COVID-19 patients using blockchain. The proposed architecture preserves the privacy of individuals and their contact history by encrypting all the data specific to an individual using a privacy-preserving Homomorphic encryption scheme and storing it on a permissioned blockchain network. The contacts made with a COVID-19 positive patient are identified by performing search queries directly over the Homomorphic encrypted data stored in the blocks. Therefore, only those contacts that are suspected to be COVID-19 positive may be decrypted by the healthcare professional or government for further contact tracing/diagnosis and COVID-19 testing; thereby leading to enhanced privacy.
Women's online magazines have been constantly proliferating and increasingly supplanting print publications. Contributing to their success, these sites offer similar content free of change and significantly greater opportunities for interaction – often in the form of discussion forums. However, these interactive spaces are currently disappearing, being replaced by an ever-escalating emphasis upon social network sites (SNSs). This article critically examines this changing model of reader interaction in women's online magazines, drawing on a study of 68 interviews with industry insiders, forum user-generated content, and a variety of trade material. The analysis demonstrates how the decision to close the forums and embrace SNSs responds to multiple determinants, including a corporate doctrine of control over users' discourse and outsourcing new modalities of free consumer labour, constituting a new ideal worker-commodity online: "the shareaholic". This exercise of power has varying levels of success, and potentialities remain for users to exercise some transformative subversion, for example through what the article theorises as "labour of disruption". Nonetheless, the emergent SNS-based magazine model of reader interaction poses a serious challenge to ongoing celebrations both in the industry and in some scholarly work about an increasingly democratic and user-led digital media ecosystem.
The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS). Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.
In this paper we present an analysis of the behavior of Italian Twitter users during national political elections. We monitor the volumes of the tweets related to the leaders of the various political parties and we compare them to the elections results. Furthermore, we study the topics that are associated with the co-occurrence of two politicians in the same tweet. We cannot conclude, from a simple statistical analysis of tweet volume and their time evolution, that it is possible to precisely predict the election outcome (or at least not in our case of study that was characterized by a "too-close-to-call" scenario). On the other hand, we found that the volume of tweets and their change in time provide a very good proxy of the final results. We present this analysis both at a national level and at smaller levels, ranging from the regions composing the country to macro-areas (North, Center, South).
This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forums Cloud Cube Model (CCM), we classify cloud computing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and Services Contracts; (3) In-House Private Clouds; (4) All-In-One Enterprise Cloud; (5) One-Stop Resources and Services; (6) Government Funding; (7) Venture Capitals; and (8) Entertainment and Social Networking. In addition, we newly propose the Hexagon Model that includes six key elements for sustainability based on Sun Tzus Art of War and literature review, and the sixth factor is rated based on case studies and peer reviews. Areas occupied in the Hexagon can represent strengths and weaknesses of a cloud business, and several cases are presented with rationale explained. We present four cases with Hexagon models, which include Google, Amazon, Facebook, Apple and an anonymous UK NHS and an University. Apart from the qualitative approach, the quantitative approach we use is the Capital Asset Pricing (CAPM), which aim organisational sustainability and predicts how well firms perform. The OMII-UK data is used to demonstrate sustainability and study the impact on cloud businesses, and is presented by statistical computation, 3D visualisation and the Hexagon Model. This leads to development of Cloud Sustainability Framework (CSF), which measures cloud business performance. CSF is part of the Cloud Computing Business Framework (CCBF), which will be discussed in some extent. We believe that adopting an appropriate cloud computing business model will help organisations investing in this technology to stand firm at all times. R&D projects can benefit from applying the right business models and strategies
Whether you call it linked data, web 3.0, or the semantic web, the next generation of web technologies is reaching maturity. With major partners like Google, the BBC, and national governments backing the W3C standard, the semantic web is poised to change the way we think about information discovery. Core themes of metadata, collaboration, and interoperability make linked data a natural philosophical match for libraries. Many pieces of the semantic puzzle already exist for libraries: RDF converters for common metadata schemas, linked LCSH and authority data, digital library & bibliographic ontology development, freely available triple stores, and open source tools to support development work. This paper provides an overview of the semantic web vision, outlines core concepts like RDF & OWL in an accessible way, introduces some of the major linked data players, and discusses the ways in which libraries are beginning to create structured data and applications in this new space. Please join us for an overview of the concepts, tools, and metadata that will underpin the next generation of web applications.
In: Kurniawan T., Denny and Ngarawula, Bonaventura (2013) Rencana strategi teknologi informasi (studi formulasi strategi teknologi informasi untuk peningkatan nilai dan pengelolaan kinerja pada Universitas Palangka Raya). Jurnal Kebijakan Publik, 10 (2). pp. 185-198. ISSN 1693-7252
Process of strategic is alwas associated with the development of the mission, strategic objectives and corporate policy, strategic olanning must therefore analyze the factors in the company's strategic Yanga condition.