This paper presents the architecture of a decision support environment for large-scale assessment of compliance against web accessibility recommendations and legislations. The proposed decision support environment aims at integrating, extending and further enhancing existing web accessibility solutions making them customizable to the needs of different stakeholders, transferable to different sectors in web and mobile environments, in order to minimize costs and development time by also increasing scalability and improving their accessibility and usability.
MyCorridor mission is to facilitate sustainable travel in urban and interurban areas and across borders by replacing private vehicle ownership by private vehicle use, as one element in an integrated/multimodal MaaS chain, through an innovative ITS platform that will combine connected traffic management and multi modal services, facilitating modal shift. It will propose a technological and business MaaS solution, which will cater for interoperability, open data sharing, as well as tackling the legislative, business related and travel-behavior adaptation barriers enabling the emergence of a new business actor across Europe, namely "Mobility Services Aggregator". The paradigm change will be proved through long distance and cross border Pilots in a European corridor of 6 countries. Those sites will develop Mobility Package tokens, purchased through one-stop-shop, and will incorporate Traffic Management Services, interfaces to Services related to MaaS multimodal PT, MaaS vehicle related services and Horizontal (business related) services.
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.
Background: Increased digitalization of healthcare comes along with the cost of cybercrime proliferation. This results to patients' and healthcare providers' skepticism to adopt Health Information Technologies (HIT). In Europe, this shortcoming hampers efficient cross-border health data exchange, which requires a holistic, secure and interoperable framework. This study aimed to provide the foundations for designing a secure and interoperable toolkit for cross-border health data exchange within the European Union (EU), conducted in the scope of the KONFIDO project. Particularly, we present our user requirements engineering methodology and the obtained results, driving the technical design of the KONFIDO toolkit. Methods: Our methodology relied on four pillars: (a) a gap analysis study, reviewing a range of relevant projects/initiatives, technologies as well as cybersecurity strategies for HIT interoperability and cybersecurity; (b) the definition of user scenarios with major focus on cross-border health data exchange in the three pilot countries of the project; (c) a user requirements elicitation phase containing a threat analysis of the business processes entailed in the user scenarios, and (d) surveying and discussing with key stakeholders, aiming to validate the obtained outcomes and identify barriers and facilitators for HIT adoption linked with cybersecurity and interoperability. Results: According to the gap analysis outcomes, full adherence with information security standards is currently not universally met. Sustainability plans shall be defined for adapting existing/evolving frameworks to the state-of-the-art. Overall, lack of integration in a holistic security approach was clearly identified. For each user scenario, we concluded with a comprehensive workflow, highlighting challenges and open issues for their application in our pilot sites. The threat analysis resulted in a set of 30 user goals in total, documented in detail. Finally, indicative barriers of HIT acceptance include lack of awareness regarding HIT risks and legislations, lack of a security-oriented culture and management commitment, as well as usability constraints, while important facilitators concern the adoption of standards and current efforts for a common EU legislation framework. Conclusions: Our study provides important insights to address secure and interoperable health data exchange, while our methodological framework constitutes a paradigm for investigating diverse cybersecurity-related risks in the health sector.