Change search
Refine search result
32333435363738 1701 - 1750 of 13556
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1701.
    Boistrup, Jessica
    et al.
    Blekinge Institute of Technology, School of Management.
    D´Este, Veronika
    Blekinge Institute of Technology, School of Management.
    Kommunikationsproblem kring marknadsföring – En studie angående kommunikationsproblem mellan rådgivare och företagare.2005Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syfte: Genom att genomföra en studie angående vilka råd i marknadsföring som ges av rådgivare och vilka råd i marknadsföring som småföretagare får vill vi ta reda på vilka kommunikationsproblem i informationssyfte som existerar i en dialog kring marknadsföring mellan nystartande rådgivare och småföretagare. Metod: Vi har använt oss av den kvalitativa metoden med ostrukturerade personliga intervjuer. Vi har intervjuat fyra rådgivare och sex företagare. Slutsatser: Den skilda synen på marknadsföring mellan rådgivarna och företagarna orsakar kommunikationsproblem mellan de båda aktörerna. Kommunikationsproblemen beror till stor del på de olika kunskapsnivåerna.

  • 1702.
    Boisvert, Alaya
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Cheevers, Sarah
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Romanchuk, Erin
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Stroebel, Karen
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Measuring Success: Indicators for Strategic Approaches to Sustainable Community Planning2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Understanding successful community planning and transparently monitoring the process through indicators is essential for empowering communities to move towards a sustainable future. This paper investigates two key categories of indicators: 1) socio-ecological indicators and 2) process indicators. The Framework for Strategic Sustainable Development, the foundation of this research, offers a science-based and principled definition of sustainability, as well as a method for structuring, evaluating and informing the design of indicators. A universally applicable set of community planning process indicators has been devised through ‘backcasting’. First, a list of Success Criteria for an ideal sustainable community planning process was developed. To determine the gaps that require monitoring, general practices in current planning were next assessed against this vision of success. Indicators were then brainstormed to measure closure of the highlighted gaps and movement towards success. Finally, these indicators were evaluated against a comprehensive list of ideal indicator characteristics. In summary, applying whole systems and strategic approaches to identifying and designing indicators can be relevant in any context. Process indicators provide the structure in which to monitor planning at every level and across disciplines so that appropriate socio-ecological indicators can then be derived, while simultaneously ensuring more effective governance.

  • 1703.
    Boivie, Joakim
    Blekinge Institute of Technology, Faculty of Computing, Department of Technology and Aesthetics.
    Digital Wanderlust: Med digital materia som följeslagare i skapandet2017Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    With this bachelor thesis I aim to bring to light the role of the computer in digital creative work. This is accomplished by treating the code that make up digital objects as a form of matter, and with Karen Barad’s agential realism and other research into digital materiality as a point of reference this matter is invited to the creative process as an actor. I’ve been striving for a glimpse of how digital matter comes to life when it’s allowed an active part in the creative process, to see how it expresses itself. By engaging with the digital matter through diffraction and remix as methods I’ve been given an insight into the core of it, and through the process I’ve been working alongside digital matter in intra action.

    Ultimately I can see how digital matter won’t appear alone, I myself and the computer are both entangled together with the digital matter as a result of the intra actions we’ve been engaging in. My intervention in digital matter becomes visible as glitches, traces of decay that give the digital matter, which can be so fleeting, more concrete and material characteristics. The unintelligible complexity of digital matter also comes to light when it’s allowed influence, as it appears visually. With this knowledge I’ve gained the awareness that digital matter does not have an absolute appearance, and this thesis can be seen as an investigation into how digital matter can appear.

  • 1704.
    Bolarinwa, Oluseun
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Waifielate, Afa
    Blekinge Institute of Technology, School of Engineering, Department of Mechanical Engineering.
    Mechanical Property Evaluation of Coconut Fibre2008Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This thesis workis eco-friendly,agricultural material.Examples of some non-wood fibre material are also discussed briefly but with emphasis on coconut fibre to evaluate its mechanical properties.Experiments were carried out and the result analyzed to calculate its young modulus,yield stress,stress and strain at break.The results obtained from the test machine were analyzed.Finite element model was created with a commercial software ABAQUS to compare results obtained from the tensile test(experiment) to arrive at meaningful results for validation

  • 1705.
    Boldero, Christina
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Paton, William
    Blekinge Institute of Technology, School of Engineering.
    Schou, Charlotte
    Blekinge Institute of Technology, School of Engineering.
    Community Mapping & Strategic Sustainable Development: Navigating Towards A Sustainable Future2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The world faces sustainability challenges directly attributable to human behaviour, and expected to irreparably degrade the socio-ecological system. Cartography (mapping) is a diverse planning and communicating discipline used for strategic development of global and local solutions to these challenges. Its flexible yet robust technology can generate common understanding of issues and inspire successful solutions. This thesis studied community mapping, specifically how community mapping practitioners (CMPs) can use community mapping tools (CMTs) more effectively for Strategic Sustainable Development (SSD). Data of current SSD strengths of six CMTs was collected using the Framework for Strategic Sustainable Development (FSSD) and 13 interviews with practitioners. Thirty-six Key Elements (KEs) of guidance for CMPs to use CMTs were developed. A Compass Model was designed to interlink the KEs, in eight interrelated categories, with the ABCD Strategic Planning Process (ABCD). The results suggest that CMPs using CMTs combined with an SSD approach have the potential to create effective solutions towards sustainability.

  • 1706. Boldt, Martin
    Privacy-Invasive Software2010Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    As computers are increasingly more integrated into our daily lives we become more dependent on software. This situation is exploited by villainous actors on the Internet that distribute malicious software in search for fast financial gains on the expense of deceived computer users. As a result, computer users need more accurate and aiding mechanisms to assist them when separating legitimate software from its unwanted counterparts. However, such separations are complicated due to a greyzone of software that exists between legitimate and purely malicious software. The software in this greyzone often vaguely labeled spyware. This work introduce both user-aiding mechanisms and an attempt to clarify the greyzone by introducing the concept of privacy-invasive software (PIS) as a category of software that ignores the users’ right to be left alone. Such software is distributed with a specific intent (often of commercial nature), which negatively affect the users to various degree. PIS is therefore classified with respect to the degree of informed consent and the amount of negative consequences for the users. To mitigate the effects from PIS, two novel mechanisms for safeguarding user consent during software installation are introduced; a collaborative software reputation system; and an automated End User License Agreement (EULA) classification. In the software reputation system, users collaborate by sharing experiences of previously used software programs, allowing new users to rely on the collective experience when installing software. The EULA classification generalizes patterns from a set of both legitimate and questionable software EULAs, so that computer users can automatically classify previously unknown EULAs as belonging to legitimate software or not. Both techniques increase user awareness about software program behavior, which allow users to make more informed decisions concerning software installations, which arguably reduces the threat from PIS. We present experimental results showing the ability of a set of machine learning algorithms ability to perform automated EULA classification. In addition, we also present a prototype implementation of a software reputation system, together with simulation results of the large-scale use of the system.

  • 1707. Boldt, Martin
    Privacy-Invasive Software: Exploring Effects and Countermeasures2007Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. In this thesis, we include an introduction to PIS, and how it differs from both legitimate and traditionally malicious software. We also present empirical measurements indicating the effects that PIS have on infected computers and networks. An important contribution of this work is a classification of PIS in which we target both the level of user consent, as well as the degree of user consequences associated with PIS. These consequences, affecting both users and their computers, form a global problem that deteriorates a vast number of users’ computer experiences today. As a way to hinder, or at least mitigate, this development we argue for more user-oriented countermeasures that focus on informing users about the behaviour and consequences associated with using a particular software. In addition to current reactive countermeasures, we also need preventive tools dealing with the threat of PIS before it enters users’ computers. Collaborative reputation systems present an interesting way forward towards such preventive and user-oriented countermeasures against PIS. Moving the software reputations from old channels (such as computer magazines or friends’ recommendations) into an instantly fast reputation system would be beneficial for the users when distinguishing unwanted software from legitimate. It is important that such a reputation system is designed to address antagonistic intentions from both individual users and groups thereof, so that users could depend on the reputations. This would allow users to reach more informed decisions by taking the reported consequences into account when deciding whether they want a specific software to enter their computer or not.

  • 1708.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Anton, Borg
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Clustering residential burglaries using multiple heterogeneous variablesIn: International Journal of Information Technology & Decision MakingArticle in journal (Refereed)
    Abstract [en]

    To identify series of residential burglaries, detecting linked crimes performed bythe same constellations of criminals is necessary. Comparison of crime reports today isdicult as crime reports traditionally have been written as unstructured text and oftenlack a common information-basis. Based on a novel process for collecting structured crimescene information the present study investigates the use of clustering algorithms to groupsimilar crime reports based on combined crime characteristics from the structured form.Clustering quality is measured using Connectivity and Silhouette index, stability usingJaccard index, and accuracy is measured using Rand index and a Series Rand index.The performance of clustering using combined characteristics was compared with spatialcharacteristic. The results suggest that the combined characteristics perform better orsimilar to the spatial characteristic. In terms of practical signicance, the presentedclustering approach is capable of clustering cases using a broader decision basis.

  • 1709.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Bala, Jaswanth
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data2016In: European Intelligence and Security Informatics Conference / [ed] Brynielsson J.,Johansson F., IEEE, 2016, p. 92-95Conference paper (Refereed)
    Abstract [en]

    Law enforcement agencies strive to link serial crimes, most preferably based on physical evidence, such as DNA or fingerprints, in order to solve criminal cases more efficiently. However, physical evidence is more common at crime scenes in some crime categories than others. For crime categories with relative low occurrence of physical evidence it could instead be possible to link related crimes using soft evidence based on the perpetrators' modus operandi (MO). However, crime linkage based on soft evidence is associated with considerably higher error-rates, i.e. crimes being incorrectly linked. In this study, we investigate the possibility of filtering erroneous crime links based on travel time between crimes using web-based direction services, more specifically Google maps. A filtering method has been designed, implemented and evaluated using two data sets of residential burglaries, one with known links between crimes, and one with estimated links based on soft evidence. The results show that the proposed route-based filtering method removed 79 % more erroneous crimes than the state-of-the-art method relying on Euclidean straight-line routes. Further, by analyzing travel times between crimes in known series it is indicated that burglars on average have up to 15 minutes for carrying out the actual burglary event. © 2016 IEEE.

  • 1710.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Borg, Anton
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    A statistical method for detecting significant temporal hotspots using LISA statistics2017In: Proceedings - 2017 European Intelligence and Security Informatics Conference, EISIC 2017, IEEE Computer Society, 2017, p. 123-126Conference paper (Refereed)
    Abstract [en]

    This work presents a method for detecting statisticallysignificant temporal hotspots, i.e. the date and time of events,which is useful for improved planning of response activities.Temporal hotspots are calculated using Local Indicators ofSpatial Association (LISA) statistics. The temporal data is ina 7x24 matrix that represents a temporal resolution of weekdaysand hours-in-the-day. Swedish residential burglary events areused in this work for testing the temporal hotspot detectionapproach. Although, the presented method is also useful forother events as long as they contain temporal information, e.g.attack attempts recorded by intrusion detection systems. Byusing the method for detecting significant temporal hotspotsit is possible for domain-experts to gain knowledge about thetemporal distribution of the events, and also to learn at whichtimes mitigating actions could be implemented.

  • 1711.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Borg, Anton
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Evaluating Temporal Analysis Methods UsingResidential Burglary Data2016In: ISPRS International Journal of Geo-Information, Special Issue on Frontiers in Spatial and Spatiotemporal Crime Analytics, ISSN 2220-9964, Vol. 5, no 9, p. 1-22Article in journal (Refereed)
    Abstract [en]

    Law enforcement agencies, as well as researchers rely on temporal analysis methods in many crime analyses, e.g., spatio-temporal analyses. A number of temporal analysis methods are being used, but a structured comparison in different configurations is yet to be done. This study aims to fill this research gap by comparing the accuracy of five existing, and one novel, temporal analysis methods in approximating offense times for residential burglaries that often lack precise time information. The temporal analysis methods are evaluated in eight different configurations with varying temporal resolution, as well as the amount of data (number of crimes) available during analysis. A dataset of all Swedish residential burglaries reported between 2010 and 2014 is used (N = 103,029). From that dataset, a subset of burglaries with known precise offense times is used for evaluation. The accuracy of the temporal analysis methods in approximating the distribution of burglaries with known precise offense times is investigated. The aoristic and the novel aoristic_ext method perform significantly better than three of the traditional methods. Experiments show that the novel aoristic_ext method was most suitable for estimating crime frequencies in the day-of-the-year temporal resolution when reduced numbers of crimes were available during analysis. In the other configurations investigated, the aoristic method showed the best results. The results also show the potential from temporal analysis methods in approximating the temporal distributions of residential burglaries in situations when limited data are available.

  • 1712. Boldt, Martin
    et al.
    Borg, Anton
    Carlsson, Bengt
    On the Simulation of a Software Reputation System2010Conference paper (Refereed)
    Abstract [en]

    Today, there are difficulties finding all malicious programs due to juridical restrictions and deficits concerning the anti-malicious programs. Also, a "grey-zone" of questionable programs exists, hard for different protection programs to handle and almost impossible for a single user to judge. A software reputation system consisting of expert, average and novice users are proposed as a complement to let anti-malware programs or dedicated human experts decide about questionable programs. A simulation of the factors involved is accomplished by varying the user groups involved, modifying each user's individual trust factor, specifying an upper trust factor limit and accounting for previous rating influence. As a proposed result, a balanced, well-informed rating of judged programs appears, i.e. a balance between quickly reaching a well-informed decision and not giving a single voter too much power.

  • 1713.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Borg, Anton
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Ickin, Selim
    Ericsson Research, SWE.
    Gustafsson, Jörgen
    Ericsson Research, SWE.
    Anomaly detection of event sequences using multiple temporal resolutions and Markov chains2019In: Knowledge and Information Systems, ISSN 0219-1377, E-ISSN 0219-3116Article in journal (Refereed)
    Abstract [en]

    Streaming data services, such as video-on-demand, are getting increasingly more popular, and they are expected to account for more than 80% of all Internet traffic in 2020. In this context, it is important for streaming service providers to detect deviations in service requests due to issues or changing end-user behaviors in order to ensure that end-users experience high quality in the provided service. Therefore, in this study we investigate to what extent sequence-based Markov models can be used for anomaly detection by means of the end-users’ control sequences in the video streams, i.e., event sequences such as play, pause, resume and stop. This anomaly detection approach is further investigated over three different temporal resolutions in the data, more specifically: 1 h, 1 day and 3 days. The proposed anomaly detection approach supports anomaly detection in ongoing streaming sessions as it recalculates the probability for a specific session to be anomalous for each new streaming control event that is received. Two experiments are used for measuring the potential of the approach, which gives promising results in terms of precision, recall, F 1 -score and Jaccard index when compared to k-means clustering of the sessions. © 2019, The Author(s).

  • 1714.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Borg, Anton
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Melander, Ulf
    En strukturerad metod för registrering och automatisk analys av brott2014In: The Past, the Present and the Future of Police Research: Proceedings from the fifth Nordic Police Research seminar / [ed] Rolf Granér och Ola Kronkvist, 2014Conference paper (Refereed)
    Abstract [sv]

    I detta artikel beskrivs en metod som används i polisregionerna Syd, Väst och Stockholm1 för att samla in strukturerade brottsplatsuppgifter från bostadsinbrott, samt hur den insamlade informationen kan analyseras med automatiska metoder som kan assistera brottssamordnare i deras arbete. Dessa automatiserade analyser kan användas som filtrerings- eller selekteringsverktyg för bostadsinbrott och därmed effektivisera och underlätta arbetet. Vidare kan metoden användas för att avgöra sannolikheten att två brott är utförda av samma gärningsman, vilket kan hjälpa polisen att identifiera serier av brott. Detta är möjligt då gärningsmän tenderar att begå brott på ett snarlikt sätt och det är möjligt, baserat på strukturerade brottsplatsuppgifter, att automatiskt hitta dessa mönster. I kapitlet presenteras och utvärderas en prototyp på ett IT-baserat beslutsstödsystem samt två automatiska metoder för brottssamordning.

  • 1715.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Borg, Anton
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Svensson, Martin
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Hildeby, Jonas
    Polisen, SWE.
    Predicting burglars' risk exposure and level of pre-crime preparation using crime scene data2018In: Intelligent Data Analysis, ISSN 1088-467X, Vol. 22, no 1, p. 167-190, article id IDA 322-3210Article in journal (Refereed)
    Abstract [en]

    Objectives: The present study aims to extend current research on how offenders’ modus operandi (MO) can be used in crime linkage, by investigating the possibility to automatically estimate offenders’ risk exposure and level of pre-crime preparation for residential burglaries. Such estimations can assist law enforcement agencies when linking crimes into series and thus provide a more comprehensive understanding of offenders and targets, based on the combined knowledge and evidence collected from different crime scenes. Methods: Two criminal profilers manually rated offenders’ risk exposure and level of pre-crime preparation for 50 burglaries each. In an experiment we then analyzed to what extent 16 machine-learning algorithms could generalize both offenders’ risk exposure and preparation scores from the criminal profilers’ ratings onto 15,598 residential burglaries. All included burglaries contain structured and feature-rich crime descriptions which learning algorithms can use to generalize offenders’ risk and preparation scores from.Results: Two models created by Naïve Bayes-based algorithms showed best performance with an AUC of 0.79 and 0.77 for estimating offenders' risk and preparation scores respectively. These algorithms were significantly better than most, but not all, algorithms. Both scores showed promising distinctiveness between linked series, as well as consistency for crimes within series compared to randomly sampled crimes.Conclusions: Estimating offenders' risk exposure and pre-crime preparation  can complement traditional MO characteristics in the crime linkage process. The estimations are also indicative to function for cross-category crimes that otherwise lack comparable MO. Future work could focus on increasing the number of manually rated offenses as well as fine-tuning the Naïve Bayes algorithm to increase its estimation performance.

  • 1716. Boldt, Martin
    et al.
    Carlsson, Bengt
    Analysing Countermeasures Against Privacy-Invasive Software2006Conference paper (Refereed)
    Abstract [en]

    User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused by PIS. We use a computer forensic tool to evaluate an anti-spyware tool, with respect to found PIS over a four years period. Within the anti-spyware tool PIS was slowly identified, caused classification problems, and formely classified PIS were sometimes excluded. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. © 2006 IEEE.

  • 1717. Boldt, Martin
    et al.
    Carlsson, Bengt
    Analysing Privacy-Invasive Software Countermeasures2006Conference paper (Refereed)
  • 1718. Boldt, Martin
    et al.
    Carlsson, Bengt
    Confidentiality Aspects within Road User Charging Systems: the Swedish Case2008Conference paper (Refereed)
    Abstract [en]

    In this paper we analyze how a proposed Swedish Road User Charging (RUC) system for differentiated distance based taxation affects the corporate confidentiality of haulers. Each hauler needs to equip all their vehicles with an On-Board Unit (OBU) that continuously send position readings back to a central server, which then is used to calculate the taxation. The fact that the system gather, process, and store information about where the vehicles travel introduce threats to the haulers’ corporate confidentiality, e.g. if the position data leak to competitors. We describe threats to various parts of the RUC system, together with protective measures. In the end of the paper we discuss the impact on corporate confidentiality if such a RUC system is introduced, e.g. how would the leakage of position data affect transports conveying sensitive goods such as medical drugs or consumer electronics.

  • 1719. Boldt, Martin
    et al.
    Carlsson, Bengt
    Privacy-Invasive Software and Preventive Mechanisms2007In: Malware: An Introduction / [ed] Jain, Ravi K., ICFAI Press , 2007Chapter in book (Other academic)
  • 1720. Boldt, Martin
    et al.
    Carlsson, Bengt
    Privacy-Invasive Software and Preventive Mechanisms2006Conference paper (Refereed)
  • 1721. Boldt, Martin
    et al.
    Carlsson, Bengt
    Jacobsson, Andreas
    Exploring Spyware Effects2004Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss various types of spyware programs, their behaviour, how they typically infect computers, and the propagation of new varieties of spyware programs. In two experiments, we investigate the occurrence and impact of spyware programs found in popular P2P applications. Based on the findings from the empirical investigations, we try to lift the perspective to a more general view on spyware deriving from the theory of (virtual) network effects. In a model, we categorize in what ways spyware might decrease the utility of belonging to a large virtual network. Here, the baseline is that spyware programs intrude systems and networks, but since they profit from user data they also intrude user privacy. In the model, the intrusions are classified as moderate, severe or disastrous. We found that spyware has the potential to overthrow the positive aspects of belonging to a large network, and network owners should therefore be very careful about permitting such programs in applications and on networks.

  • 1722. Boldt, Martin
    et al.
    Carlsson, Bengt
    Jacobsson, Andreas
    Exploring Spyware Effects2007In: Spyware: An Insight / [ed] Jain, Ravi K., Hyderabad: ICFAI University Press , 2007, p. 39-58Chapter in book (Other academic)
  • 1723. Boldt, Martin
    et al.
    Carlsson, Bengt
    Larsson, Tobias
    Lindén, Niklas
    Preventing Privacy-Invasive Software using Online Reputations2008Conference paper (Refereed)
    Abstract [en]

    Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This paper proposes the use of a specialized reputation system to gather and share information regarding software behaviour between community users. A client application helps guide the user at the point of executing software on the local computer, displaying other users’ feedback about the expected behaviour of the software. We discuss important aspects to consider when constructing such a system, and propose possible solutions. Based on the observations made, we implemented a client/server based proof-of-concept tool, which allowed us to demonstrate how such a system would work. We also compare this solution to other, more conventional, protection methods such as anti-virus and anti-spyware software.

  • 1724. Boldt, Martin
    et al.
    Carlsson, Bengt
    Martinsson, Roy
    Software Vulnerability Assessment: Version Extraction and Verification2007Conference paper (Refereed)
  • 1725.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    jacobsson, andreas
    Malmö University, SWE.
    Baca, Dejan
    Fidesmo AB, SWE.
    Carlsson, Bengt
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Introducing a novel security-enhanced agile software development process2017In: International Journal of Secure Software Engineering, ISSN 1947-3036, E-ISSN 1947-3044, ISSN 1947-3036, Vol. 8, no 2Article in journal (Refereed)
    Abstract [en]

    In this paper, a novel security-enhanced agile software development process, SEAP, is introduced. It has been designed, tested, and implemented at Ericsson AB, specifically in the development of a mobile money transfer system. Two important features of SEAP are 1) that it includes additional security competences, and 2) that it includes the continuous conduction of an integrated risk analysis for identifying potential threats. As a general finding of implementing SEAP in software development, the developers solve a large proportion of the risks in a timely, yet cost-efficient manner. The default agile software development process at Ericsson AB, i.e. where SEAP was not included, required significantly more employee hours spent for every risk identified compared to when integrating SEAP. The default development process left 50.0% of the risks unattended in the software version that was released, while the application of SEAP reduced that figure to 22.5%. Furthermore, SEAP increased the proportion of risks that were corrected from 12.5% to 67.9%, a more than five times increment.

  • 1726.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Jacobsson, Andreas
    Carlsson, Bengt
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    On the risk exposure of smart home automation systems2014In: Proceedings 2014 International Conferenceon Future Internet of Things and Cloud, IEEE Computer Society Digital Library, 2014Conference paper (Refereed)
    Abstract [en]

    A recent study has shown that more than every fourth person in Sweden feels that they have poor knowledge and control over their energy use, and that four out of ten would like to be more aware and to have better control over their consumption [5]. A solution is to provide the householders with feedback on their energy consumption, for instance, through a smart home automation system [10]. Studies have shown that householders can reduce energy consumption with up to 20% when gaining such feedback [5] [10]. Home automation is a prime example of a smart environment built on various types of cyber-physical systems generating volumes of diverse, heterogeneous, complex, and distributed data from a multitude of applications and sensors. Thereby, home automation is also an example of an Internet of Things (IoT) scenario, where a communication network extends the present Internet by including everyday items and sensors [22]. Home automation is attracting more and more attention from commercial actors, such as, energy suppliers, infrastructure providers, and third party software and hardware vendors [8] [10]. Among the non-commercial stake-holders, there are various governmental institutions, municipalities, as well as, end-users.

  • 1727. Boldt, Martin
    et al.
    Jacobsson, Andreas
    Lavesson, Niklas
    Davidsson, Paul
    Automated Spyware Detection Using End User License Agreements2008Conference paper (Refereed)
    Abstract [en]

    The amount of spyware increases rapidly over the Internet and it is usually hard for the average user to know if a software application hosts spyware. This paper investigates the hypothesis that it is possible to detect from the End User License Agreement (EULA) whether its associated software hosts spyware or not. We generated a data set by collecting 100 applications with EULAs and classifying each EULA as either good or bad. An experiment was conducted, in which 15 popular default-configured mining algorithms were applied on the data set. The results show that 13 algorithms are significantly better than random guessing, thus we conclude that the hypothesis can be accepted. Moreover, 2 algorithms also perform significantly better than the current state-of-the-art EULA analysis method. Based on these results, we present a novel tool that can be used to prevent the installation of spyware.

  • 1728.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Rekanar, Kaavya
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Analysis and text classification of privacy policies from rogue and top-100 fortune global companies2019In: International Journal of Information Security and Privacy, ISSN 1930-1650, E-ISSN 1930-1669, Vol. 13, no 2, p. 47-66Article in journal (Refereed)
    Abstract [en]

    In the present article, the authors investigate to what extent supervised binary classification can be used to distinguish between legitimate and rogue privacy policies posted on web pages. 15 classification algorithms are evaluated using a data set that consists of 100 privacy policies from legitimate websites (belonging to companies that top the Fortune Global 500 list) as well as 67 policies from rogue websites. A manual analysis of all policy content was performed and clear statistical differences in terms of both length and adherence to seven general privacy principles are found. Privacy policies from legitimate companies have a 98% adherence to the seven privacy principles, which is significantly higher than the 45% associated with rogue companies. Out of the 15 evaluated classification algorithms, Naïve Bayes Multinomial is the most suitable candidate to solve the problem at hand. Its models show the best performance, with an AUC measure of 0.90 (0.08), which outperforms most of the other candidates in the statistical tests used. Copyright © 2019, IGI Global.

  • 1729.
    Boldt, Martin
    et al.
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Wieslander, Johan
    Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
    Investigating Spyware in Peer-to-Peer Tools2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Peer-to-Peer (P2P) tools are used exclusively when their users are connected to the Internet, thus constituting a good foundation for online commercials to help finance further tool development. Although software that displays ads (adware) is very common, activity monitoring or information collecting software that spies on the users (spyware) may be installed together with the P2P tool. This paper will present a method for examining P2P tool installations and present test results from a few of the most common P2P tools. It will also discuss whether these tools, with their bundled software, make any privacy intrusions. Finally, the method itself will be evaluated and suggestions of refinements will be proposed.

  • 1730. Boldt, Martin
    et al.
    Wieslander, Johan
    Carlsson, Bengt
    Investigating spyware on the internet2003Conference paper (Refereed)
  • 1731.
    Bolin, Amanda
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Petersson, Julia
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Vuxna personers upplevelser av att leva med en behandlingsbar cancersjukdom: En litteraturstudie baserad på patografier2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Bakgrund: Minst var tredje person i Sverige beräknas få en cancersjukdom någon gång under livet. En behandlingsbar cancersjukdom kan innebära ett flertal förändringar i personens liv. Förändringarna kan gälla till exempel tankar, känslor och kroppsliga förändringar. Många personer med en behandlingsbar cancersjukdom upplever brister när det kommer till stöd från vårdpersonal. För att kunna anpassa omvårdnaden kring vuxna personer med en behandlingsbar cancersjukdom behövs ökad kunskap och förståelse kring hur det är att leva med behandlingsbara cancersjukdomar.

    Syfte: Syftet med studien var att beskriva vuxna personers upplevelser av att leva med en behandlingsbar cancersjukdom.

    Metod: Studien genomfördes som en litteraturstudie baserad på patografier. Analysen gjordes med hjälp av Graneheim och Lundmans tolkning av en kvalitativ innehållsanalys.

    Resultat: Analysen ledde fram till fem kategorier och två underkategorier. Den första kategorin var en känsla av personlig förändring. Den andra kategorin var längtan tillbaka till det gamla livet. Nästa kategori var tankar om döden. Den fjärde kategorin var att känna styrka med underkategorierna vilja och kämpaglöd och nära och käras betydelse. Den sista kategorin var tankar om framtiden.

    Slutsats: En känsla av personlig förändring med avsnittet kring en förändrad syn på och känsla för kroppen, tankar om döden samt vilja och kämpaglöd var tre utmärkande upplevelser i resultatet. Genom en förståelse kring upplevelser hos vuxna personer med en behandlingsbar cancersjukdom kan vårdpersonal och nära och kära minska lidandet och öka välbefinnandet hos personerna. Något som framkom i föreliggande studie var att nära och kära hade en betydelsefull roll för personerna med en behandlingsbar cancersjukdom. Vidare forskning skulle därför vara intressant att göra kring anhörigas perspektiv av att leva i närheten av en person med en behandlingsbar cancersjukdom. 

  • 1732.
    Bolinder, Christina
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    Ett grönområdes framtid: - utifrån människans utbredning och naturens behov2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    I Stockholms län finns ett stort behov av att bygga bostäder, arbetsplatser och infrastruktur. Orsaken till utbyggnadsbehovet av bostäder är en befolkningsökning inom länet. Utbyggnaden sker både genom påbyggnad av befintliga huskroppar, förtätningar, återanvändning av sedan tidigare hårdgjorda ytor men också genom att använda marken i befintliga parker och natur.

    I mitt arbete har jag en forskningsfråga/hypotes om att det är möjligt att bygga inom ett grönområde utan att dess värde förloras.

    För att utreda hur ett grönområdes värden kan påverkas vid ny bebyggelse har jag valt att studera två olika områden, Kymlinge och Söderby, som ligger inom Järvakilen och göra en jämförelsestudie mellan dessa. Grönområdet, Järvakilen, är en av Stockholms grönkilar som bland annat fungerar som rekreationsområde.

    Planförslagen för Kymlinge och Söderby grundas på närbesläktade förutsättningar såsom närhet till rekreationsområde med natur, infrastruktur med vägbuller från ett stort flöde av trafik och kraftledningsgator. En skillnad däremot är avståndet till närliggande tätort. I båda fallen tas delvis jungfrulig mark i anspråk. Lite speciellt för Kymlinge är att här finns en tunnelbanestation uppförd som inte har blivit färdigställd och att ett kommunalt naturreservat har inrättats. I jämförelsen har likheter och skillnader i planeringen tagits fram utifrån inventering, analys och planförslag.

  • 1733.
    Bollineni, Pavan Kumar
    et al.
    Blekinge Institute of Technology, School of Computing.
    Neupane, Kumar
    Blekinge Institute of Technology, School of Computing.
    Implications for adopting cloud computing in e-Health2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Cloud computing is an emerging and growing field in an IT industry. Cost minimization, fast processing, easy accessibility and scalability are found to be the main attracting features of cloud computing. Cloud computing is known to be as robust authentication and enhanced security provider technology and it is increasing its scope in many sensitive areas like health sectors where data privacy and security hold the key position. Some of the issues when applying cloud solution is; trust of the new system, data confidentiality, security, storage and most importantly data sharing between different data centers locating in different geographical locations. Objectives: The aim of this thesis is to explore the limitations and find the opportunities and barriers between cloud computing and e-Health and finally suggest guidelines for adoption of cloud computing in an e-Health based sectors based on associates concerns. In the context of this research work, the authors have studied issues involved in the deployment of cloud computing, associates concerns and factors regarding adoption of cloud computing in e-Health and finally suggestion of future of cloud computing in e-Health. Methods: In order to identify and to get a deeper understanding of those issues, the author performed literature review, conducted interview with health care personnel and cloud computing associates and finally backed up with a web-based survey from the associates of cloud computing and e-Health. Results: Finally after the completion of entire analysis authors purposed suitable deployment model and guidelines for adoption of cloud computing in e-Health. Conclusions: Authors concluded that most people’s concerns can be due to lack of knowledge about cloud computing and the trust of vendor. However, authors also observed that people are facing problems with data security, data integrity and too much dependency to the technology and vendors.

  • 1734.
    Bollner, Jenny
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Ta tillvara ungdomarnas kunskap i planeringen!2005Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    SAMMANFATTNING Under en praktik sommaren 2003 hade jag i uppgift att utifrån barn och ungdomars synvinkel ge förslag på var en gång- och cykelvägstunnel skulle placeras utefter en riksväg. Riksvägen delade ett bostadsområde, med många barnfamiljer, från centrum där all service, som exempelvis skola, dagis, affärer och sportanläggningar var belägna. Jag kom då till insikt att det inte är vanligt förekommande att ungas kunskap tas tillvara i planeringen, och det var då mina tankar kring detta examensarbete började. Syftet med examensarbetet har därför varit att ta fram ett samlat kunskapsunderlag på den offentliga miljöns betydelse för ungdomar och utifrån detta genomföra en fallstudie. Fallstudien skall visa på fjortonåringars användning och upplevelse av innerstaden i Bollnäs, samt informationen därefter kan tas tillvara i planeringen. Ungdomarna använder sig av det offentliga rummet på ett annat sätt än vi vuxna och det kan därför vara svårt att som vuxen se vad som är det bästa för ungdomarna i planeringen. Ungdomar ser staden som en tillgång och använder den för en mängd olika saker. Framförallt för sociala aktiviteter så som att umgås med vänner, visa upp sig och pröva olika stilar och roller mot. Vuxna använder istället staden för nödvändiga och målinriktade aktiviteter. Det finns många forskare som studerat ungdomars användning av och betydelse för olika platser i våra samhällen. Sammanfattningsvis av deras studier kan sägas att ungdomarna har behov av två sorters platser. Dels platser där de kan vara ”on-stage” och platser där de kan vara ”back-stage”. Platser vilka fungerar som ”on-stage” ger möjlighet till att kunna visa upp sig, vara okontrollerade samt till möten och konfrontationer. På platser ”back-stage” behöver ej ungdomarna känna ansvar, här har de kontroll och kan vara självständiga. Dessa platser är ofta skyddade, d.v.s. det fi nns ingen insyn från vuxenvärlden och de är därmed ostörda, tillskillnad från ”on-stage” platser. (Liedberg 1989) Det offentliga rummet har en stor betydelse för ungdomar, då det bland annat: - Ger en personlig ram, utifrån vilken andra platser därefter bedöms. - Ger en förståelse för historia, avstånd och sociala relationer. - Ger möjlighet att skapa kamratrelationer. Platser vilka fungerar som ”back-stage” kan dessutom ge möjlighet till: - Fysiska och intellektuella utmaningar. - Ett utvecklande av oberoende. För att ungdomarna skall kunna använda och utvecklas är stadens alla rum, som redovisats ovan av stor betydelse. Det blir då viktigt att stadens struktur ger möjlighet för ungdomarna att självständigt kunna förflytta sig. Gång- och cykelnätets utbyggnad och utformning, kollektivtrafikens turtäthet och sträckning får då stor betydelse. Viktigt är även att de utformas på ett sådant sätt så att de ej upplevs otrygga, så att det inte blir ett hinder i ungdomarnas möjlighet att använda staden. För att kunna uppnå detta måste en kunskap från ungdomarna fås. Trots att ungdomar har stor kunskap om staden tar vi vuxna sällan tillvara den. Det finns inget som egentligen talar mot ungdomars inflytande i planeringen. Tvärtom talar både internationella dokument, så som Barnkonventionen, Agenda 21 och BRA 21 för deras inflytande. Så även Svenska lagar som Plan- och bygglagen, Väglagen och Miljöbalken, vilka förespråkar att barn och ungdomar kan komma att ingå i samrådskretsen. De som dock bestämmer vilka som skall ingå i samrådskretsen är vi planerare. Detta är alltså vårt ansvar! Att få med ungdomarna i planeringen. För att kunna öka de ungas inflytande i planeringen menar Boverket att vi behöver förändra de vuxnas attityder, ta tillvara de ungas kunskap i alla steg till dess att ett område/ plats är färdig, precisera spelreglerna samt presentera material så att alla förstår. (Boverket 2000) Metoder är av stor vikt i arbetet med de unga. Detta eftersom de ej har samma möjlighet som vuxna att i ord förmedla det de känner eller upplever. Metoder, som att t. ex rita kartor, fotografera eller markera platser på en karta, kan därför vara bra att som planerare använda sig av, för att få del utav deras upplevelser och användning av staden. (Maria Nordström 2002) I min fallstudie, vilken jag genomförde i Bollnäs med åtta stycken elever ur en åttondeklass, använde vi oss av metoder så som dessa. Ur fallstudien fick jag kunskap om vilka stråk och målpunkter i innerstaden som var viktiga för ungdomarna. Jag fick även kunskap om hur de upplevde dessa platser samt hur de använde dem. Kanske kan vi förstå att vissa platser och stråk har en stor betydelse för ungdomar, men hur de upplever och använder dem kan vi inte veta förrän vi frågar dem. Många gånger planerar vi med tanke på att förbättra för de unga, exempelvis då vi planerar för gång- och cykelvägar. Det är då många planerare som inte tar tillvara den kunskap som de unga har, utan bara ser till sitt eget kunnande och tycker att det räcker. Jag anser ej att detta är tillräckligt eftersom de unga ser saker ur ett annat perspektiv än vuxna, nämligen ur ett ungdomsperspektiv. Jag anser därför att det är viktigt, att som planerare, även ge de unga möjligheter att få förmedla sina kunskaper om staden. Kunskap från ungdomar kan vara till stor hjälp vid såväl nyplanering av ett område som i förätningsprojekt, så som förnyelse av ett område eller en plats. Genom min fallstudie fick jag information som skulle kunna tas tillvara inom olika nivåer i planeringen. Mycket av informationen kan också tas tillvara inom olika förvaltningar, detta för att kunna förbättra olika områden/platser som fjortonåringarna pekat ut. Kunskapen skulle även kunna fungera som ett planeringsunderlag vid såväl översiktliga överväganden om markanvändning, som i en detaljplans programskede. Det jag anser vara bra för en planerare att tänka på i arbetet med de unga är: - Förstå att de unga har en kunskap om staden som du ej har - Skapa kontakter med lärare och elever - Bygg upp ett förtroende - Låt arbetet ta den tid som behövs - Var kreativ och använd din fantasi - Var tydlig om vad arbetet kommer att leda till - Var ej byråkratisk - Och framförallt ha roligt!

  • 1735.
    Boloz, Katarzyna
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    Metzler, Dennis
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    The regional impact of low-cost carriers: Case study of Katowice and Skavsta airports2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    In our thesis we have presented the airports’ activity in the scope of impact of the Low Cost Carriers based on two cases: Katowice and Skavsta Airports. By analyzing the indicators for airports’ growth we described how the advantage of LCCs have affected in perceiving the airports, their regions and the LCCs’ services itself. We have found out that there’s a connection between the economic condition of the region and the types of services which the LCCs have in offer. Since both airports are facing similiar scale of the expansion, different drivers found in the regions’ features were stimulating the air traffic and shaping a dominant profile of the passenger. Following the patterns in respect to tourism we have concluded that the limitations which occur around low-cost services possibly shape the behaviour of travel planning. Whereas the activity of LCCs’ services are generally recognized as profitable to the region, we argue that in some cases the neighbourhood hampers the development in this sector.

  • 1736.
    Bolter, Jay
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Digital Technology and the Remediation of Cinema.2006In: New Media: Production, Development, Distribution / [ed] Damasio, M.J., Lisbon: COFAC , 2006, p. 14-23Chapter in book (Other academic)
  • 1737. Bolter, Jay
    "Imediace, hypermediace, remediace."2005In: Teorie vedy / Theory of Science XIV, Vol. XXVII, no 3, p. 5-40Article in journal (Other academic)
  • 1738.
    Bolter, Jay
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    New Media and the Permanent Crisis of Aura2006In: Convergence. The International Journal of Research into New Media Technologies, ISSN 1354-8565, E-ISSN 1748-7382, Vol. 12, no 1, p. 21-39Article in journal (Refereed)
    Abstract [en]

    Walter Benjamin is best known for his essay ‘The Work of Art in the Age of Mechanical Reproduction’, (Benjamin, 1968b) in which he argues that film and other mechanical technologies are destroying the aura that had belonged to traditional art. In this article we apply Benjamin’s concept of aura to new (digital) media, and in particular to ‘mixed reality’, a group of technologies that blend computer-generated visual, aural, and textual information into the user’s physical environment. We argue that mixed reality increases the options for designer-artists and apparently allows the invocation of aura in new ways. Our culture’s pursuit of auratic experience remains problematic in mixed reality as it was for Benjamin in the case of film. New media maintain aura in a permanent state of oscillation or crisis, and this crisis is a key to understanding new media.

  • 1739.
    Bolter, Jay
    Blekinge Institute of Technology, School of Planning and Media Design.
    The Desire for Transparency in an Era of Hybridity2006In: Leonardo: Journal of the International Society for the Arts, Sciences and Technology, ISSN 0024-094X, E-ISSN 1530-9282, Vol. 39, no 2, p. 109-111Article in journal (Refereed)
    Abstract [en]

    Our culture has come to appreciate hybrid representational practices not only in digital media but also in traditional forms such as television and film. Nevertheless, our culture's fascination with a contrary representational practice—its "desire for immediacy"—remains strong. The desire for immediacy manifests itself not only in popular entertainment forms, but also (with unfortunate results) in the popular understanding of forms of scientific representation.

  • 1740.
    Bolter, Jay
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Transference and Transparency: Digital Technology and the Remediation of Cinema.2006In: Intermédialités, ISSN 1705-8546, Vol. 6, p. 13-26Article in journal (Refereed)
    Abstract [en]

    New digital forms, particularly computer and video games, pose a challenge to the cultural status that film has enjoyed for decades. This challenge provoked an anxiety about new media reflected in a series of films in the 1990s, including eXistenZ and The Matrix. Hollywood filmmakers have responded to the challenge with a twofold strategy: they have adopted computer-graphic special effects, while maintaining a commitment to linear narrative and transparent representation. Recently, the DVD has led the film industry to explore hybrid forms of representation and even interactivity.

  • 1741. Bolter, Jay David
    et al.
    Engberg, Maria
    Blekinge Institute of Technology, School of Planning and Media Design.
    MacIntyre, Blair
    Media studies, mobile augmented reality, and interaction design2013In: interactions, ISSN 1072-5520, E-ISSN 1558-3449, Vol. 20, no 1, p. 36-45Article in journal (Other academic)
    Abstract [en]

    You are walking in the Sweetwater Creek State Park near Atlanta and using the Augmented Reality (AR) Trail Guide, a mobile application designed by Isaac Kulka for the Argon Browser (Figure 1). The application offers two views: a now familiar Google-style map, with points of interest marked on its surface, and an AR view, which shows these points located in space. You see the map view when you hold the screen parallel to the ground; when you turn the phone up to look at the world, you get the AR view with the points of interest floating in space in front of you. This simple gesture of raising the phone changes your relationship to the information. You pass from a fully symbolic form of representation to a form of perceiving symbolic information as part of your visual environment. The AR Trail Guide, developed in the Augmented Environments Lab at Georgia Tech [1], illustrates a new realm in AR design that goes beyond current commercial applications. In this article, we discuss some of these new areas, such as designing for experiences in cultural heritage, personal expression, and entertainment. At the same time, we want to address a larger issue. ACM interactions has often been a place for exploring new paradigms and the relevance for interaction design of unusual approaches from other disciplines. In that spirit, we pose the question: Can the humanistic discipline of media studies play a useful role in interaction design? Media studies looks at the history of media and their relationship to culture, and we will focus here on digital media and their relationship to other media, both present and past. Looking at digital media in a historical context is relevant because of the dynamic relationship between "traditional" media (film, television, radio, print) and their digital remediations. How can media studies be made to contribute to the productive work of interaction design? We believe one answer lies in using the historical understanding gained through media studies to develop a kind of media aesthetics that can guide designers as they explore new forms of digital media such as the mobile augmented reality application described above.

  • 1742.
    Bolter, Jay
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Gandy, M.
    MacIntyre, B.
    Dow, Steven
    Supporting Early Design Activities for AR Experiences.2007In: Emerging Technologies of Augmented Reality: Interfaces and Design / [ed] Haller, M.; Billinghurst, M.; Thomas, B. H., Hersey, PA: Idea Group Publishing , 2007, p. 160-180Chapter in book (Other academic)
  • 1743.
    Bolter, Jay
    et al.
    Blekinge Institute of Technology, School of Technoculture, Humanities and Planning.
    Gromala, Diane
    Transparency and Reflectivity: Digital Art and the Aesthetics of Interface Design.2006In: Aesthetic Computing / [ed] Fishwick, P.A., Cambridge, MA: MIT Press , 2006, p. 369-382Chapter in book (Other academic)
  • 1744.
    Boman Eriksson, Sofia
    et al.
    Blekinge Institute of Technology.
    Herbertsson, Annika
    Blekinge Institute of Technology.
    Upplevelser av att genomföra livsstilsförändringar vid diabetes typ 2.: en litteraturstudie2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Bakgrund: Diabetes typ 2 är en metabolisk sjukdom som beräknas öka framöver. Den som drabbas av diabetes typ 2 kan behöva ändra sin livsstil för att kunna hantera sin sjukdom och undvika att drabbas av framtida komplikationer. Förändringar som kan behöva göras är framförallt att ändra kostvanor och öka den fysiska aktiviteten.

    Syfte: Syftet med litteraturstudien var att beskriva personers upplevelser av att genomföra livsstilsförändringar vid diabetes typ 2.

    Metod: En litteraturstudie baserad på tio vetenskapliga artiklar med kvalitativ metod. Artiklarna analyserades med Graneheim och Lundmans tolkning av kvalitativ innehållsanalys.

    Resultat: I resultatet framkom huvudkategorierna: Inte kunna leva som innan, meningslöshet, motivation och kroppsligt välbefinnande. Underkategorierna som framkom var: svårigheter med egenvården, att inte vara som andra, social påverkan, behov av stöd och behov av kunskap.

    Slutsats: Personerna upplevde svårigheter och känslor som förlust och meningslöshet över att göra livsstilsförändringar vid diabetes typ 2. Det fanns en bristande kunskap kring sjukdomen och personerna upplevde att ökad kunskap hade hjälpt dem att förändra sin livsstil. Det visade sig även att stöd och motivation var en viktig faktor för att kunna upprätthålla livsstilsförändringarna. Flera av personerna upplevde att livsstilsförändringarna hade positiv effekt då de nu kände sig friskare än innan sjukdomen. Denna kunskap kan vara betydande för sjuksköterskan som genom stöd och motivation kan hjälpa dessa personer att förändra sin livsstil. 

  • 1745.
    Boman, Frida
    et al.
    Blekinge Institute of Technology, School of Health Science.
    Nihltorp, Mette
    Blekinge Institute of Technology, School of Health Science.
    Barns upplevelser av sjuksköterskans bemötande i sjukhusmiljö: En litteraturstudie2011Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Varje år skrivs 110 000 barn in på sjukhus i Sverige. Mötet med sjuksköterskan är av stor betydelse för barnens upplevelse av vården. Syftet med studien var att belysa barns upplevelser av sjuksköterskans bemötande i sjukhusmiljö. Barnen i denna studie var mellan 4-18 år. Den utförda studien var en litteraturstudie med kvalitativ ansats och grundades på åtta vetenskapliga artiklar. Artiklarna analyserades enligt den metod som Graneheim och Lundman beskriver. Fyra kategorier, som påverkade barnens upplevelse av bemötandet med sjuksköterskan, framkom i studien; delaktighet, rädsla, sjuksköterskan samt omgivning. Barnen ville vara delaktiga i sin egen vård och hade synpunkter på hur sjuksköterskan och omgivningen på sjukhuset skulle vara. Alla barn kände någon form av rädsla inför sin sjukhusvistelse. Barn ska ses som unika individer och få tillgång till samma vård som vuxna, men på ett åldersanpassat sätt.

  • 1746.
    Boman, Jenny
    et al.
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Johansson, Kristin
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Finansiella och icke-finansiella mål: relationen dem emellan2003Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Syftet med uppsatsen är att öka förståelsen för om det föreligger en relation mellan finansiella och icke-finansiella mål i högteknologiska företag och hur denna i så fall gestaltar sig. En kvalitativ metod har företagits. Personliga intervjuer genomfördes på tre företag med två respondenter på vardera. Genom att belysa empiri genom teori försökte vi göra tolkningar rörande relationen. Det tycks föreligga en relation mellan finansiella och icke-finansiella mål. Icke-finansiella mål anses behöva ses tillsammans med finansiella för att generera något positivt. Det har framkommit att icke-finansiella mål är ett led i att nå de finansiella. Företagen kan dock inte säkerställa några samband, vilket har att göra med icke-finansiella måls svårigheter att nå upp till målstyrningens förutsättningar. De icke-finansiella målen ses inte som en restriktion, då finansiella i en valsituation prioriteras.

  • 1747.
    Boman, Jenny
    et al.
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Johansson, Kristin
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Nilsson, Carolina
    Blekinge Institute of Technology, Department of Business Administration and Social Science.
    Intellektuellt kapital: motiv för och emot visualisering av immateriella tillgångar2002Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Syftet med uppsatsen är att ur ett ledningsperspektiv öka förståelsen för motiven till varför/varför inte kunskapsintensiva tjänsteföretag väljer att visualisera intellektuellt kapital. I uppsatsen har den kvalitativa metoden använts. Vi har samlat in primärdatan genom telefonintervjuer och frågeformulär via e-mail. I analysen har vi tolkat den insamlade datan för att kunna få en förståelse av forskningsfrågan. Det som tydligt framträder i vår undersökning är att kunskapsintensiva tjänsteföretag väljer att visualisera intellektuellt kapital för att visa sitt verkliga värde, erhålla uppmärksamhet och utvecklas internt. De som väljer att inte visualisera ser det svåra i att värdera immateriella tillgångar då det inte finns någon standardiserad och vedertagen metod, samt att det tar stora resurser i anspråk.

  • 1748. Boman, Karl-Fredrik
    et al.
    Eriksson, Per
    Lagö, Thomas L
    Lindblad, Sven
    Reproducerbara mätningar av efterklangstider-metodanalys och apparatkonstruktion1997Conference paper (Refereed)
  • 1749. Boman, Magnus
    et al.
    Johansson, Stefan J.
    Modeling Epidemic Spread in Synthetic Populations: Virtual Plagues in Massively Multiplayer Online Games2007Conference paper (Refereed)
  • 1750. Boman, Magnus
    et al.
    Velde, Walter Van deHägg, Staffan
    MAAMAW´97 Poster Proceedings1997Report (Other academic)
    Abstract [en]

    Eight European Workshop on Modelling Autonomous Agents in a Multi-Agent World

32333435363738 1701 - 1750 of 13556
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf