{"response":{"docs":[{"system_create_dtsi":"2020-05-15T22:50:12Z","system_modified_dtsi":"2020-05-15T22:50:19Z","has_model_ssim":["Article"],"id":"pz50gx42n","accessControl_ssim":["fcc3cdaa-855f-4f54-b6f9-b8493f2900f3"],"hasRelatedMediaFragment_ssim":["z029p6046"],"hasRelatedImage_ssim":["z029p6046"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A Community-based Approach to Co-Managing Privacy and Security in Smart Homes"],"date_uploaded_dtsi":"2020-05-15T22:50:12Z","date_modified_dtsi":"2020-05-15T22:50:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/p2kf-mn08"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Brandopadhayay, Rajdeep","Halse, Shane","Elrod, Nathan J.","Kropczynski, Jess","Burden, Eric"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This study proposes enhanced oversight of smart homes by leveraging the social networks of homeowners to co-monitor for emergencies, while being mindful of privacy preserving features necessary for adoption. A pilot co-design workshop was conducted to determine features for co-monitoring. A group of four participants provided early findings and informed modifications to study design, and new insights for user behavior were emphasized. By refining the study design, we hope to better target users’ tacit knowledge in future workshops. Early findings include the users’ need for more than simply sharing access to a camera during an emergency in the home; users desired control over the microphone, the camera video stream, and the length of time. We believe this work will contribute to a broader understanding of features that better meet the needs and goals of smart device owners to enable co-monitoring.\r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/11"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/z029p6046?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["z029p6046"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["z029p6046"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"COMMUNITYBASED APPROACH TO COMANAGING PRIVACY AND SECURITY IN SMART HOMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/pz50gx42n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686893178880,"timestamp":"2021-04-15T06:26:26.005Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:47:56Z","system_modified_dtsi":"2020-05-15T23:24:21Z","has_model_ssim":["Article"],"id":"tt44pp09h","accessControl_ssim":["83ea3652-4301-48ac-883f-9a5fbbf28025"],"hasRelatedMediaFragment_ssim":["gx41mk17p"],"hasRelatedImage_ssim":["gx41mk17p"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Smart Home Repos: Taking Data from Devices"],"date_uploaded_dtsi":"2020-05-15T22:47:55Z","date_modified_dtsi":"2020-05-15T23:24:21Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/1p51-4y21"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Mahajan, Pranav"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This is an ongoing research project focused on creating a framework for capturing various artifacts concerning Internet of Things devices. Research has shown a severe lack of frameworks focusing on collecting data from and about IoT devices. Mozilla’s WebThings Gateway focuses on collecting this information from the devices. This project expects to find methods of IoT data collection through a proposed test-bed utilizing the WebThings Gateway."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/9"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/gx41mk17p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gx41mk17p"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["gx41mk17p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SMART HOME REPOS TAKING DATA FROM DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/tt44pp09h"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086683333263360,"timestamp":"2021-04-15T06:26:22.610Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:45:56Z","system_modified_dtsi":"2020-05-15T22:46:03Z","has_model_ssim":["Article"],"id":"2f75r916x","accessControl_ssim":["93596cd5-d3bb-4ef4-89df-3c9288060bb2"],"hasRelatedMediaFragment_ssim":["s7526d822"],"hasRelatedImage_ssim":["s7526d822"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Understanding Decision-Making Needs of Open Government Data Users"],"date_uploaded_dtsi":"2020-05-15T22:45:56Z","date_modified_dtsi":"2020-05-15T22:45:56Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/shpp-5481"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Murthy, Svati Sundara"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Open Government Data (OGD) promotes transparency, innovation, and value creation that makes information gathered by the government about the city and community open to all. The City of Cincinnati Open Government Data Portal allows citizens to access local data as part of a local OGD initiative. Although these datasets are available and are used by a broad audience, little is known about how users engage with this data and the general usability of the platforms. To learn more about this audience, this study is conducted in two steps 1)- a think-aloud activity and 2)- an online survey. Through these activities, we aim to gather information about how the users are interacting with the available data and for what purpose are they interacting with different sections of the portal. After gathering relevant data from the think-aloud activity, we aim to generate a questionnaire by analyzing all the information collected in the previous event at a larger scale. Using a web-based survey shared with individuals via Qualtrics, we will explore the use of the portal to gain more insight and knowledge on user requirements and their suggestions. The endpoint of this study is to develop insights that will help us understand user expectations and how changes could benefit the portal."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/5"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/s7526d822?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["s7526d822"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["s7526d822"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"UNDERSTANDING DECISIONMAKING NEEDS OF OPEN GOVERNMENT DATA USERS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/2f75r916x"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686287101952,"timestamp":"2021-04-15T06:26:25.427Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:43:40Z","system_modified_dtsi":"2020-05-15T22:43:44Z","has_model_ssim":["Article"],"id":"j098zc44r","accessControl_ssim":["d4c63124-cd44-4db2-a724-5d521d4e7b58"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach"],"date_uploaded_dtsi":"2020-05-15T22:43:40Z","date_modified_dtsi":"2020-05-15T22:43:40Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g8mz-xf69"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Alalade, Emmanuel Dare"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Internet of Things (IoT) enabled smart homes to have made our daily lives easier, but these conveniences have also introduced security concerns. IoT devices hold security risks as well as smart home hubs and gateways. Gateways present a centralized point of communication among devices that can create a backdoor into network data for hackers but also present a detection opportunity. Intrusion detection is a common way to detect anomalies in network traffic. This paper introduces early work on an intrusion detection system (IDS) by detecting anomalies in the smart home network using Extreme Learning Machine and Artificial Immune System (AIS ELM). AIS uses the clonal Algorithm for the optimization of the input parameters, and ELM analyzes the input parameter for better convergence in detecting anomalous activity. The larger goal of this work is to apply this approach to a smart home network gateway and combined it with a push notification system that will allow the homeowner to identify any abnormalities in the smart home network and take appropriate action."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/3"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTRUSION DETECTION SYSTEM IN SMART HOME NETWORK USING ARTIFICIAL IMMUNE SYSTEM AND EXTREME LEARNING MACHINE HYBRID APPROACH","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/j098zc44r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086687355600896,"timestamp":"2021-04-15T06:26:26.446Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":14,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Gonen, Bilal","hits":3,"label":"Gonen, Bilal"},{"value":"Elrod, Nathan J.","hits":2,"label":"Elrod, Nathan J."},{"value":"Li, Chengcheng","hits":2,"label":"Li, Chengcheng"},{"value":"Ozer, Murat","hits":2,"label":"Ozer, Murat"},{"value":"Adewale, Adewopo Victor","hits":1,"label":"Adewale, Adewopo Victor"},{"value":"Alalade, Emmanuel Dare","hits":1,"label":"Alalade, Emmanuel Dare"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":14,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":14,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":14,"label":"- School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":14,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":12,"label":"University of Cincinnati"},{"value":"University of Cincinnati ","hits":1,"label":"University of Cincinnati "}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04-14","hits":14,"label":"2020-04-14"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"ws859g993","hits":14,"label":"ws859g993"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":14,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":2,"next_page":null,"prev_page":1,"total_pages":2,"limit_value":10,"offset_value":10,"total_count":14,"first_page?":false,"last_page?":true}}}