Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.
The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%.
This research focuses on two fundamental aspects of hot spot policing that have been widely neglected by previous scholarly research. These aspects include the adequate concentration of crime at a smaller geographical unit to be considered a crime hot spot, and the cost-benefit implication of focusing limited police resources on such a smaller place in an effort to prevent criminal activities. Substantial limitations in call-t- service data from police departments raise concern on the purported concentration of crime at places that warrant such strategy in the first place. We will examine data from the Cincinnati Police Department and propose guidelines on adopting a threshold when designating places as crime hot spots, using time and cost-benefit analysis as key determinants.
Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate.
This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research.
Signature-based intrusion detection methods report high accuracy with a low false alarm rate. However, they do not perform well when faced with new or emerging threats. This work focuses on anomaly-based data driven methods to identify potential zero-day-attacks using a specific class of neural networks known as the autoencoder.
Previous studies have offered a variety of explanations on the relationship between democracy and the internet. Some argue that with free access to information, knowledge sharing without any constraint, and the spread of political knowledge, the internet will help change people’s political attitudes and spread democracy. Other studies found that authoritarian regimes by censoring the internet, tracking the political activist, prosecuting the dissidents, and using the internet to spread their propaganda limit the democratization. Also, some studies explored the effects of diffusion of false news through the internet and especially via social media. However, most of these studies concentrate on regions, specific states or authoritarian regimes. No study has investigated the influence of the internet in partly free countries defined by the Freedom House. Moreover, very little is known about the effects of online censorship on the development, stagnation, or decline of democracy. To fully understand the impact of the internet and online censorship on democratization in partly free countries, we must explore these relationships in these countries. Drawing upon the International Telecommunication Union, Freedom House, and World Bank reports and using machine learning methods, this study sheds new light on the effects of the internet on democratization in partly free countries. The findings suggest that internet penetration and online censorship both have a negative impact on democracy scores and the internet’s effect on democracy scores is conditioned by online censorship. Moreover, results from random forest suggest that online censorship is the most important variable followed by governance index and education on democracy scores.
The paper focuses on exploring the social networks of technology caregivers and caregivees and also work on learning their preferred mode of information exchange. Responses from the participants of the study will throw light on the relationships between different efficacies (discussed in detail in the paper) that may have an impact on an individual’s decision. Participant’s responses are recorded through well constructed surveys that have been distributed around by word of mouth or specific social media platforms which will also prove if being a power user has any effect on the end result. The responses will be analyzed and the various efficacy constructs such as self efficacy, community collective efficacy will be kept in mind.
This study proposes enhanced oversight of smart homes by leveraging the social networks of homeowners to co-monitor for emergencies, while being mindful of privacy preserving features necessary for adoption. A pilot co-design workshop was conducted to determine features for co-monitoring. A group of four participants provided early findings and informed modifications to study design, and new insights for user behavior were emphasized. By refining the study design, we hope to better target users’ tacit knowledge in future workshops. Early findings include the users’ need for more than simply sharing access to a camera during an emergency in the home; users desired control over the microphone, the camera video stream, and the length of time. We believe this work will contribute to a broader understanding of features that better meet the needs and goals of smart device owners to enable co-monitoring.
This is an ongoing research project focused on creating a framework for capturing various artifacts concerning Internet of Things devices. Research has shown a severe lack of frameworks focusing on collecting data from and about IoT devices. Mozilla’s WebThings Gateway focuses on collecting this information from the devices. This project expects to find methods of IoT data collection through a proposed test-bed utilizing the WebThings Gateway.
Open Government Data (OGD) promotes transparency, innovation, and value creation that makes information gathered by the government about the city and community open to all. The City of Cincinnati Open Government Data Portal allows citizens to access local data as part of a local OGD initiative. Although these datasets are available and are used by a broad audience, little is known about how users engage with this data and the general usability of the platforms. To learn more about this audience, this study is conducted in two steps 1)- a think-aloud activity and 2)- an online survey. Through these activities, we aim to gather information about how the users are interacting with the available data and for what purpose are they interacting with different sections of the portal. After gathering relevant data from the think-aloud activity, we aim to generate a questionnaire by analyzing all the information collected in the previous event at a larger scale. Using a web-based survey shared with individuals via Qualtrics, we will explore the use of the portal to gain more insight and knowledge on user requirements and their suggestions. The endpoint of this study is to develop insights that will help us understand user expectations and how changes could benefit the portal.
Internet of Things (IoT) enabled smart homes to have made our daily lives easier, but these conveniences have also introduced security concerns. IoT devices hold security risks as well as smart home hubs and gateways. Gateways present a centralized point of communication among devices that can create a backdoor into network data for hackers but also present a detection opportunity. Intrusion detection is a common way to detect anomalies in network traffic. This paper introduces early work on an intrusion detection system (IDS) by detecting anomalies in the smart home network using Extreme Learning Machine and Artificial Immune System (AIS ELM). AIS uses the clonal Algorithm for the optimization of the input parameters, and ELM analyzes the input parameter for better convergence in detecting anomalous activity. The larger goal of this work is to apply this approach to a smart home network gateway and combined it with a push notification system that will allow the homeowner to identify any abnormalities in the smart home network and take appropriate action.
Devices in the Internet of Things (IoT) have enhanced our ability to automate functions in smart homes and increased our ability to monitor day to day activities regardless of whether we are in our home. Despite these benefits of IoT devices, it is the case that notifications about threats to our home when we are away are typically only sent to one or two people within the home. We proposed enhanced monitoring of threats by allowing temporary access to IoT devices to extended networks of homeowners in situations where primary IoT device owners are not able to address a smartphone notification quickly.
As incessant cyber-attacks on organizations increase in complexity and destructiveness with the aim
to disrupt services and steal information, proactive measures are critically needed to mitigate these
attacks, cyber security risk assessment tops the list of measures. This study provides an overview of
cybersecurity risk assessment, various types of frameworks, and the difference between qualitative
and quantitative cybersecurity risk assessments. The aim of this early research is the creation of a
hybrid system which integrates an existing cybersecurity risk assessment system based on the NIST framework into the Factor Analysis of Information Risk (FAIR) model, an analytic risk assessment model that enables true quantitative measurement. In this study, we propose a hybrid-assessment tool which will be used to describe and compare the impact of using NIST driven values
as inputs for the resistance strength to determine the Loss Event Frequent (LEF) and Annual Loss
Expectancy (ALE) of a risk scenario as opposed to using experts’ opinion as user inputs for determination of the LEF and ALE values.
A great deal of data is generated every day on social media, although this information is used for marketing purposes regularly, it has the potential to serve other purposes, such as in crisis management. This study focuses on collecting data from social media, specifically Twitter, in order to help 911 telecommunicators (floor supervisors, call takers, and dispatchers) to 1) identify Twitter users requesting assistance during a crisis, 2) identify information that may be useful to incidents that were called into 911, and 3) pass the information to the first responders (police, fire, and emergency medical services). Previous research in this area can be summarized into three stages. First, a set of information requirements has been developed that must be satisfied to dispatch first responders and meet their immediate awareness needs. Second, a coding schema has been presented to identify six types of actionable information. Finally, it proposed automated methods based on previous literature which can be used to implement these methods in the future (Kropczynski et al. 2018). This research concentration is on refining social media data by starting with finding local tweets that contain this information and recognize patterns of how it is used. Next, patterns will be used in the development of automated methods in the future. The contribution of this work is extending the coding schema of the 6Ws and put it on an action, develop an interface to view the data of social media separated by the 6Ws. It will begin with just on of the six Ws (Weapons).
Depression is a common illness that negatively affects feelings, thoughts and behaviors and can harm regular activities like sleeping. It is a leading cause of disability and many other diseases (Choudhury, et al 2013, Mathur et al, 2016, Watkins et al, 2013). According to WHO (World Health Organization) 1 statistics, more than 300 million people over the world are affected in depression and in each country at least 10% are provided treatment. Poor recognition and treatment of depression may aggravate heart failure symptoms, precipitate functional decline, disrupt social and occupational functioning, and lead to an increased risk of mortality (Cully, et al 2009). Early detection of depression is thus necessary. Unfortunately the rates of detecting and treating depression among those with medical illness are quite low (Egede, 2007). This research proposes a solution of using random forest classifier algorithm to detect and predict detection. A mobile application will be developed in order to collect user data and make prediction.
Cloud computing has been one of the major disruptive technology of this century changing the entire face of IT infrastructure across all spectrum. This has led to tremendous development, improvement and cost efficient means of securing IT infrastructures. Virtualization is the backbone driving the numerous cloud solutions and also making them marketable in the pay-as-you-use mechanism for all kind of deployment. This research is focus on improving the security and performance of cloud storage, backup and disaster recovery by evaluating the possibility of eliminating the Recovery Point Objective (RPO) and Recovery Time Objective (RTO). A live synchronization between production and Disaster Recovery (DR) sites is presented. We considered the mechanism behind Virtual Machines (VM) and hypervisor interaction with physical memory on host computers and evaluated the ability of VM to read/write directly to a unified multiple storage locations. Dependencies, requirements and guidelines for implementing this solution would also be analyzed.
Shooting crime is a serious public health problem in the US. The analysis of any historical crime data reveals that crime is non-randomly distributed in time and space. Based on this notion, hot spots policing has gained its momentum to effectively predict future crime locations. Recent studies; however, pointed out that traditional hot spots policing occasionally predict rare crimes such as homicides and shootings due to their less frequent recurring counts in a given place and time (specifically for shorter time periods such as weeks and months). Given this context, we developed a new shooting prediction system (SHOPS) to explore whether recent dynamic/mobility activity patterns of known violent individuals increase the prediction of short-term fatal and non-fatal shootings compared to the traditional hot spots policing. Findings suggest that SHOPS predicts fatal and non-fatal shooting locations more precisely by identifying fewer hotspot locations. Policy implications of the study were discussed in the conclusion section.
The principles of minimalist design are evident in much of the technology we use today. This is especially the case with mobile applications. The most successful of which attempt to minimize the amount of user input needed to provide users with the information they are seeking. Although many mobile applications use data gathered by in-system activity such as a GPS to minimize input from users—some systems require user input, such is the case with roommate matching. This study utilizes the RoomUP mobile application as a testbed to define minimal criteria that can be used to gather user input and produce a compatible roommate match. Participatory design with prospective student users is used to reduce the number of variables and provide recommendations for a minimalistic user interface. The resulting prototype is then used to verify that it meets design goals and supports a satisfactory user experience.
The healthcare industry is thriving and the abundant amount of data involved raises call for help
relating to managing and maintaining them. It becomes a hassle to keep the data in it’s required
place and to pull and retrieve whenever necessary. The search for a proper data mining technique
to enhance the process is always appreciated and encouraged. Our era is controlled by the
upcoming technologies that are fast paced and yield great results. There is always a scope for
improvement and optimization. Every individual from every generation has been an avid user of
mobile phone and its applications. Healthcare facilities have slowly begun to depend on applications and technologies associated and supported by mobile phones and other networking platforms in order to have everyone within the facility and also the patients who have ties to the facility have access to the information that they are entitled to have.
With the prevalence of anxiety, depression, and stress among young adult populations, adaptive and innovative treatment options
must be considered for the future. While there are various approaches to mental health treatment, art therapy is one traditional
method that has been used to treat the symptoms of mental health disorders across various health contexts and populations. Some art
therapists have even integrated information and communication technologies (ICTs) into their practices. With these factors in mind
and considering the prominence of ICTs use among student populations, this study seeks to understand how the immersion and
presence afforded by one such technology, virtual reality (VR), can impact the outcomes of art therapy practices. Through the use of
an arts-based VR application, Tilt Brush, this study compares traditional art therapy methods as they are employed in and outside of
VR. Through the comparison of self-reported measures, we can better understand the possibilities and effectiveness of art therapy
practices delivered via Tilt Brush VR.
Hypervisor-based hardware virtualization- also known as the first phase of virtualization uses Virtual Machines (VM) to provide better hardware resource utilization and application isolation. A VM provides some level of portability, but still requires a full operating system (OS) with all the binaries and libraries required to run the service it hosts. Therefore, moving an application from a development to a production environment for instance is no different than moving them between two Physical Machines (PM). Container-based virtualization-sometimes known as the next phase of virtualization addresses some of these limitations by providing virtualization at the OS level. Docker is an open source engine launched in 2013 by a company called Docker, Inc. Docker is used to manage the lifecycle of containers. Using containers, it is no longer necessary to dedicate an entire VM to an application in order to provide isolation, thus saving OS license costs. In this project we plan to formulate a generic model that can be used to fine tune a container-based setup for maximum performance benefit.
A new formula has been developed that determines the passage of time. In the paper, this is particularized for cases of temporary dilation due to speed and gravity.
Additionally, using the previous equation, an interpretation of the nature of black holes, their formation, growth, and dimension can be developed.
Moreover, and based on all of the above, a different way of understanding mass and space is proposed. Which ultimately implies an alternative expression that relates mass and energy.
The development of complex and dependable systems like autonomous vehicles relies increasingly on the use of systems modeling language (SysML). In fact, SysML has become a de facto standard for systems engineering. With model-driven engineering, a SysML model serves as a reference for the early defect detection of the system under design: the earlier the errors are detected, the less is the cost of handling the errors. Mutation testing is a fault-based technique that has recently seen its applications to SysML behavioral models (e.g., state machine diagrams). Specifically, a system's state-transition design can be fed to a model checker where mutants are automatically generated and then killed against the desired design specifications (e.g., safety properties). In this paper, we present a novel approach based on process mining to improve the effectiveness and efficiency of the SysML mutation testing based on model checking. In our approach, the mutation operators are applied directly to the state machine diagram. These mutants are then fed as traces into a process mining tool and checked according to the event logs. Our initial results indicates that the process mining approach kills more mutants faster than the model checking method.
Shortly after the comparative analysis of Codding et al. was published, I prepared a comment on the article that I submitted for publication. In response to feedback from the editors, I eventually revised the manuscript substantially. That revised version has now been published. In this paper, I share the original submission of the comment, which focuses on important considerations for future studies of risk-‐ sensitive foraging. Meanwhile, Codding and his colleagues have published a response to my comment. They exhibit some confusion about my position, which they describe as “paradoxical.” In a reply to their response, I have therefore added some clarifying remarks at the end of this paper
This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application.
The resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
Intelligent Application if defined technically is a strategy that uses hyper-personalized mobile app experiences and services and knowledge-extraction processes to increases the user experience (Jessica Ekholm, 2017). In simple words, the applications that not only know how to support or enable key decisions but also continually learn from the user interactions to become even more relevant and valuable to those users, are known as Intelligent apps. Such applications are smart enough to differentiate between relevant and irrelevant information with the help of AI algorithms. Moreover, these apps have the capability to ease the complex task into the as simple task as a single touch.
A conversation between two friends who are not musicians and whose personal histories could hardly be more different. Through a series of conversations we explored those journeys, compared and contrasted our stories, and discussed just why this music affects us so deeply. We discussed specific musicians in terms of whether we liked, did not like, or were indifferent to their music, and why we either agreed or not. In these conversations we posed various questions to each other, hoping to discover and articulate certain essences that we might share. One thing we agreed upon up front is that we are neither musicians nor music critics. In fact, we’re not convinced that the field of music criticism is even a valid endeavor. Music description and personal reaction, however, is another matter. In our conversations we tried to describe our reactions to specific musicians and “schools” of music, without labeling the music as “good” or “lousy”. You will see that this doesn’t prevent us from disagreeing and disagreeing in spirited fashion, while always trying to focus on why our personal reaction is what it is.
In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing.
In the field of information technology, virtual reality and simulation learning have become huge trends, not only in gaming and entertainment, but also in academic fields such as medicine. In the past, medical training has always been costly in providing tools and resources for entry-level medical students to acquire proper training. Medical training conducted in a virtual environment has not only yielded higher success rates, but has also reduced resource costs overall. However, with no standardized guidelines for conducting certain training regimens and learning skills, there are still studies that show some medical training programs do not produce the best results. This research focuses on analyzing the usage of virtual reality in current medical training programs to design a medical, virtual reality, training program. This program will revolve around entry-level medical students who will be attending the University of Cincinnati’s College of Medicine. This research proposal will not only examine previous research on the utilization of virtual reality in various types of medical training, but also discuss the potential benefits of developing this training program at UC.
IASDR 2017 Workshop
Design now faces with new challenges that have made us rethink about our current design paradigm. It motivated us to organize a forum called, Design 3.0 Forum at KAIST in 2016, where we invited globally renowned design researchers and practitioners from different countries to discuss about important agenda for emerging challenges. The agenda we extracted from this forum can be summarized as follows: 1) envisioning of designers' future roles on open creativity and design; 2) dissemination and evaluation of design research outcomes by keeping deep design values; and 3) post education and practice that moves beyond the current use-centered perspectives by thinking big toward social innovation and large-scale impact.
As the result of the Design 3.0 forum, we all agreed that we must continue to develop and extend these agenda and collaboratively make executable actions to carry them out in the design community. In this special session at IASDR 2017, not only the organizers of the previous Design 3.0 forum (i.e. Youn-kyung Lim, Ron Wakkary, Kun-pyo Lee, and Tek-jin Nam), we invite the people who have not participated in the previous forum but can provide important insights on these issues. For the format of the session, we will take the panel format where the invited participants will present their positions first, and then have in-depth discussion on them among the participants and the audience. Through this special session, we expect to advance the initial Design 3.0 agenda and can generate more concrete and executable action items for Design 3.0.
Please follow developments of this work at http://design3-0.org/2017iasdr/
IASDR 2017 Guest Speaker
Tracy Moss is an independent design consultant and currently serves as the Course Director for Counter-Proliferation Opportunity Design at Joint Special Operations University, MacDill Air Force Base, Florida. As co-founder of the U.S. Special Operations Command (USSOCOM) Design Thinking education program, she also serves as core faculty for the full complement of design-related courses and activities at the university and headquarters.
Ms. Moss retired from military service in 2015 having spent 20 years on active duty in both the U.S. Air Force and U.S. Navy. During her final four years of military service at USSOCOM, she served as the lead Analyst and Planner on two operational design teams and as Chief of Counter-Weapons of Mass Destruction Analysis.
IASDR 2017 Guest Speaker
Bob Schwartz joined GE Healthcare (GEHC) in December 2007 as General Manager, Global Design & User Experience. With five studios in four countries, Bob is responsible for overseeing the Global Design function encompassing human factors, industrial design, ergonomics, user-interface, environmental design, and design research. As a strategic driver of organic business growth, his team focuses on the look, feel usability and end-to-end experience of GEHC products and services. Bob is also the GE Healthcare Global Executive Sponsor of the People with Disabilities Network.
Since 2009, Global Design/UX has been the recipient of 19 medals from the International Design Excellence Awards (IDEA) and was listed, in 2011, by Fast Company magazine as a Corporate Design Stronghold. In 2015, Bob’s career trajectory was cited by Fast Company as among the top Chief Design Officers. In 2015 the Industrial Designers Society of America (IDSA) named him among the 50 most notable industrial designers of the last 50 years. Bob was recently elected Chair of the Board of the Design Management Institute.
Continuously engaged in Design education throughout his career, he is a two-term member of the Board of Trustees of the Milwaukee Institute of Art & Design and its Executive Committee and is Chair of its Academic Excellence Committee.
Bob is also a member of the Design Management Advisory Board at Northwestern University and has had similar roles at Savannah College of Art and Design and Carnegie Mellon University. Further, he has also held a design faculty appointment at the University of Cincinnati. While at P&G, Bob applied his leadership to developing the School Collaboratives Program there and has created similar relationships in his other roles with academic institutions globally.
Bob joined GEHC from Procter & Gamble, where he was a global design leader working to transform the design function there to a strategically relevant capability, which is now comprised of 350 global designers and design managers. Prior to P&G, Bob was Vice President, New Product Development, at Levolor Kirsch, a division of Newell Rubbermaid, where he brought innovation to the home decor industry. At Motorola, Bob was the Director of Design, responsible globally for all key product lines within the Commercial, Government, Industrial and Consumer Products businesses.
As Executive Director and COO for the Industrial Designers Society of America (IDSA) Bob forged an unprecedented relationship with Business Week magazine to annually publish the Industrial Design Excellence (IDEA) awards and later the Catalyst Awards. This accomplishment led to Bob receiving a United Nations appointment to the People's Republic of China as Senior Advisor for Design. He has also testified before Congress on a Bill to establish a US Design Center in the Dept. of Commerce.
Bob was also the Director, Science and Technology Programs for AdvaMed, where he forged strong partnerships with the FDA, HCFA and Congress and lobbied and directed policy and voluntary standards research for circulatory and cardiovascular devices, healthcare information systems and the prevention of sexually transmitted diseases. Prior to this, Bob was the head of Corporate Industrial Design and Architecture for the American Red Cross, where he implemented new nation-wide mobile blood collection, tissue banking and disaster services systems and blood center laboratory designs.
Most notably, Bob was inducted into the IDSA Academy of Fellows at the 2007 World Congress of Industrial Design, for his outstanding contributions to the industry.
Bob has a Masters degree in Industrial Design from the Rhode Island School of Design, where he was a Roddy Scholar, and a Bachelor of Fine Arts in Industrial & Graphic Design from the Kansas City Art Institute.
The phenomenon of design entrepreneurship has received attention in the field of design. The trend of design entrepreneurship emerges in Taiwan and becoming a new career option for designers. Entrepreneurial activities can promote economic growth through innovation and knowledge spillovers. Studies on designer entrepreneurship are warranted because it proposes the possibility of entrepreneurial innovation, contributing to industrial and economic development. A multiple case study was employed, and seven design-led startups were selected as case study subjects to explore and conclude how these firms integrate their own profession and acquire resources to construct the value chain so as to keep the company operational and profitable. According to the results, the value chain of design-led startups is identified. The findings are further discussed to provide a better understanding of the entrepreneurial path of design-led startups in Taiwan.
IASDR 2017 Guest Speaker
Mark Hallerberg is Dean and Professor of Public Management and Political Economy at the Hertie School of Governance, a private public policy School in Berlin, Germany. His research focuses on fiscal governance, tax competition, financial crises, public sector innovation, and European Union politics.
He previously held academic positions at Emory University, where he maintains an affiliation with the political science department, as well as at the University of Pittsburgh and Georgia Institute of Technology. He received his PhD from UCLA in 1995.
Currently, there are many threats to small businesses, from simple employee mishandling of sensitive data to hackers attempting to breach systems for consumer data. In this paper, I attempt to review what threats businesses are currently facing, current challenges to implementing a security program, and possible ways to implement a security solution.
Keywords: Information Security, Cyber Security, Least Privilege, Risk Mitigation, Small Business, Trojan, Phishing, Malware, Ransomware, Skimmers, Security Program
Eliciting multiple stakeholder narratives is a critical factor when designing systems, services or products. This research explores how the use of an analog tool (the picture postcard) in the digital age can be used to elicit socio-cultural stories to support design for ‘social practice’. The process combines people and things by using a participatory design approach and material culture studies to design, explore and analyze the complex nature of interactions between social ideals and the artefact.
The study emphasizes ‘slow immersion and design’ by creating prolonged interactions that allow people to sit with someone else’s perspective while also introspecting about their own. In an age of echo-chambers, the research examines the impact of reducing the risk of fragmentation (where people assign themselves into homogenous groups leading to an amplification of pre-existing views (Sunstein, 2001)) on participants’ ability to generate and sustain a healthy exchange of honest, social narratives.
The research findings reveal a deep bonding between participants and a reduction of implicit biases that initiates a broader range of discussions within a given socio-cultural topic. The space for ‘elastic interaction’ (articulation of ideas without fear of judgment; when and how they want it to be expressed) allows honest thoughts to manifest. The findings also reveal that this process slowly allows for an empathetic acceptance of another’s perspectives.
The poster illustrates the research through these various approaches: the process of slow immersion and design research with a combination of postcard exchanges, one-on-one interviews and participatory design research activities to help elicit the stories for a sociocultural co-design space.
IASDR 2017 Guest Speaker
Meredith Davis has taught for forty-seven years and served as head of the Department of Graphic Design, Director of Graduate Programs in Graphic Design, and Director of the PhD Design program at NC State University. She is an AIGA fellow and national medalist, Alexander Quarles Holladay Medalist for Teaching Excellence, and fellow and former member of the accreditation commission of the National Association of Schools of Art and Design, for which she drafted the national standards for the evaluation of college-level design programs. She serves as a member of the education advisory committee of the Cooper Hewitt Smithsonian National Design Museum and is a former president of the American Center for Design. Meredith is a frequent author–including four books on design and design education– and serves on the editorial boards of She Ji and Design Issues. Her research includes a two-year study of design-based teaching and learning for the National Endowment for the Arts, which received a CHOICE award from the National Association of College and Research Libraries.
She has served on the development teams for two National Assessments of Educational Progress, most recently for the scenario-based evaluation of 21,500 students in Technology and Engineering Design Literacy. She authored a five-year research study of teaching critical and creative thinking across the college curriculum, featured in a study by the Organization for Economic Co-operation and Development on the effectiveness of higher education in preparing students for innovation jobs. She has reviewed proposals for the Smithsonian Office of Education and Museum Studies, National Science Foundation, US Department of Education, Institute of Museum and Library Services, and Canadian Foundation for Innovation, and her work has been funded by the Kenan Institute for Engineering, Science and Technology; National Endowment for the Arts; Worldesign Foundation; and several state commissions.
This paper explores the findings of a study into the telecommunications environment in Mongolia. It was hoped that an effective self-learning resource for the prevention of developmental dysplasia of the hip (DDH) in infants for distribution to parents in that country could be created and evaluated using these findings. Based on a field survey conducted in Mongolia, the most effective format this resource should take was identified. A prototype was created that featured video taken from both a third-person and parent’s (first person) perspective. After further evaluation, this prototype is to undergo revisions that will be assessed in Japan and Mongolia before a final version is distributed utilizing information and communication technologies (ICT). It was found that a visual message that did not rely on written language was the most effective means of communicating the desired message. With input from nursing staff in Mongolia, the Sapporo City University School of Design and School of Nursing came to leverage their respective strengths to create an effective prototype that will be used as the basis for a resource for relaying this preventive information to the target audience.
The rapid development of IoT technology has accelerated the growth of smart services. Despite the proliferation of smart services, academic research is still in its early stage particularly in terms of service experience and service design. Concerning a service experience viewpoint, it is essential to consider the context and environment of smart services, namely “smart servicescape,” as this can influence users’ entire experience.
Moreover, the smart servicescape will have different characteristics due to the convergence of online and offline connected environments. With this background, this study aimed to propose a framework for the smart servicescape by identifying new dimensions that reflect the characteristics of smart services.
Accordingly, an initial analytic framework of service experience blueprint was established on the basis of the conventional servicescape and service blueprinting. Twenty movie clips on smart home services officially produced by ICT corporations were collected, were analyzed through grounded theory, and were classified according to the analytic framework. Through a series of qualitative analysis, the framework structure was improved to make it more suitable for the smart servicescape. Finally, this study proposed a framework for the smart servicescape derived from the smart home service experience blueprint. The values of this framework can be identified in two aspects: (1) by identifying new dimensions to reflect the characteristics of smart services such as Smart device, Datascape, and Connected scape; and
(2) by suggesting the structure of the service experience blueprint infused with the perspective of service experience, which consists of service encounters and the servicescape.
*Use Related Links URL to access presentation video
Seattle Cancer Care Alliance and Premera Blue Cross show you how we conducted design research to build a collective understanding of the cancer care experience. We will provide detailed instructions, with checklists, on how to recreate a similar collaboration, including how we worked and what we worked on. You will walk away knowing how we shared skills and resources, built credibility and equal playing fields, and delivered research insights to both our organizations from multiple perspectives and vantage points.
Seattle Cancer Care Alliance (SCCA) brings together the leading research teams and cancer specialists from Fred Hutchinson Cancer Research Center, Seattle Children's and UW Medicine. Based in Seattle, SCCA is one of the top five Adult Cancer Care facilities in the United States as ranked by U.S. News & World Report. Shay Ghassemian, User Experience Designer in Digital Health, and Katie Rehfield, Patient Experience Specialist, will be facilitating this workshop.
Premera Blue Cross is a not-for-profit health insurance company serving 2 million people across the United States. As the largest health plan in the Pacific Northwest, Premera offers a wide range of products for individuals and families, Medicare recipients, and employers ranging from small business to Fortune 100 companies. Irish Malig, Senior Manager of Experience Strategy, Robert Racadio, Design Research Manager, Design Strategists Sara Bell, Paul Braun, and Ryan Rosensweig, and Darci Brown, Healthcare Implementation Manager in Provider Experience, will all be facilitating this workshop.
Presented by Shay Ghassemian and Robert Racadio
It was late on a Friday evening. A great time to avoid crowds. Most people were dining and drinking, absorbing the city’s capacity for pleasure, or maybe relaxing at home. That left the supermarket to me and others whose lives are synchronized differently. But as I stumbled my way through those harshly lit corridors of obscene American consumption, I realized I was among some highly unusual company. In every aisle, there were people—people?—clad in blue uniforms with devices attached to their forearms and fingertips, cables and wires dangling, each methodically filling large specialized carts. These were not shoppers like me. They were employees of the grocery chain operating— operated by?—new software for online ordering and curbside pickup. Surely, this wasn’t such a strange scene in contemporary stores around the world. Yet, it did raise strange—radical? — possibilities: a specter of “before” for an unforeseeable and potentially unpleasant “after.” The unity of the human and the machine, not implanted but merged in the operation, made me wonder: Are they cyborgs? Incipient cyborgs? Is this still a supermarket? Or an altogether different kind of space? One in the process of becoming? But becoming what?
The image that flashed to mind was that of an Amazon fulfillment center: a million acres of non-stop conveyor belts with robots finding and retrieving machine-labeled products and filling yellow bins under the supervision of a handful of humans. Robotic automation creating efficiency while eliminating the unpredictable and unproductive complexities of human labor and interactions. Perhaps, supermarkets are undergoing a transformation from spaces where humans browse, compare, select, and purchase to cyborg-operated warehouses. Perhaps this rapid and fundamental revision of function is an inevitable result of the increasing rate of technical reformation of everyday life.
Then again, perhaps my lucid vision of this scene as a new-reality- becoming is an example of what has been called “dystopian imagination”—an imaginary projection of “ethical and political concern” [Baccolini & Moylan, 2]. Or maybe it’s only a personal paranoia about the brave new world unfolding.
Kaleidoscope-Special Sessions Presentation
You may have labored for years to achieve your current market success. But as your success grows, so do expectations.
Growth targets require both capitalizing on existing business practices and innovating new ones. It can be a challenge to do both.
Kaleidoscope's VP of Research and Development, Mike Clem, DVM, Ms shares his understandable, memorable and easy-to- apply "Ships and Castle" model.
Childhood obesity increases the risk of obesity in adulthood and is associated with cardiovascular disease risk factors. The prevalence of overweight and obesity is increasing in China. It is necessary to develop an intervention project for preschool children. Based on a service design project aiming at the communication of balanced diet information to the preschool children in China, this paper discusses how to take advantage of the digital platform and game-based learning to empower the preschool children. It argues for the importance of the DIKW hierarchy for empowerment. It also proposes an innovative model to involve new stakeholders into the whole system and to improve the viability of the project.
Design is by nature an interdisciplinary, dynamic, and fluid discipline (Cross, 1982; Friedman, 2003). To define what design is has proved to be a very difficult—if not impossible and meaningless—exercise (Friedman, 2000), making also the understanding of the evolution of both the design discipline and practice a complex challenge. A rapidly changing technological landscape increases the breadth of design both in geographical terms and by extending to new domains, merging with different and new disciplines.
Communication Design especially, being closer to the information and the media spheres, is the most sensitive and receptive design area. Communication Design finds online a fertile ground for its growth and developments, thus the online environment and the Web especially can be explored, dug, and mapped as mirrors of that evolution. The aim of our research is to map through the Web the complexity of the intersections between design as a discipline and design as a field of practice. Our exploration and representation of the online design territory covered four online environments: Behance, Wikipedia, Google, and the websites of the top one hundred design universities. The study has been conducted by using digital, statistical, and visualization methods. This exploration seeks neither to confirm theories nor predict the future, rather, it wants to make explicit and observable what Communication Design has become today. It aims to screenshot the state of the art, the emerging paths, in order to understand where and how it is going to develop. The attempt is to make design as a complex phenomenon visible, through the construction of a set of maps and representations for professors, students, and associations. These representations are tools to trigger reflections on the discipline
In societies where productivity is prioritized over presence, anxiety abounds. The extensive and alarming effects of anxiety on the mental and physiological wellbeing of bachelor students inspired a cross-disciplinary team to tackle this problem. Using combined expertise in visual design, music technology, psychology, art therapy and mindfulness — a digital tool entitled “Modes” was born. The Modes digital tool is an atmospheric, introspective, and aesthetically sophisticated engagement of three senses: ophthalmoception (sight), audioception (hearing), and tactioception (touch). Through immersive interaction, mesmerizing visual and sound landscapes are generated in order to reduce anxiety in bachelor students. The two measurable outcomes of Modes are 1) the reduction of self-reported anxiety in bachelor students, and 2) the reduction of bachelor student heart rates.
Interacting with the Modes digital tool is like playing in a sandbox of dynamic visuals and music. Users begin by selecting and entering one of three digital environments entitled Refocus, Chill, or Energize. Each environment (or mode) offers a unique set of visuals and music designed specifically for anxiety reduction. The design and functionality of Modes are rooted in tenets of mindfulness practice and Ayurveda — an ancient Indian healing system emphasizing inner balance as a method for maintaining health and wellness (Kiefer, 2016). The Refocus, Chill, and Energize modes aim to balance each of three governing principle of Ayurveda that regulate physiological activity. Ultimately, users may combat and control their anxiety in three targeted ways: by refocusing, chilling, or energizing.
Graphic design is often seen in the commercial context and is discussed through topics linked to software and technology. When we look around us we can realise that billboards, banners, posters and most of the print that surround us in the public space are delivering messages of marketing, corporations, consumerism and other commercially inclined narratives. This, however, is not the only way to comprehend the practice of a graphic designer. Graphic design can take a socio-pedagogical and historical role and distribute alternative messages in the society which are not linked to money and consumption, unless education, reading and studying are considered consumption of sorts.
It is obvious that graphic design is a powerful tool that shapes our understanding of reality. This happens through being exposed to the work. Posters are claimed to mirror societies by many theorists and most visual communication is mediated by a graphic designer. Thus, Bonsiepe stated already in 2005 in his speech Design and Democracy that there is an absence of questioning activities linked to design production. It is yet a relevant theme that research needs to approach; also in a post-colony where the printed poster is ubiquitous. A simple sheet of printed paper. A very simple but extremely complex and powerful. There lies an investigation that this paper will start. The outcome of this paper to share knowledge within the researchers about creating new meaningful pathways in understanding globally important practice of graphic design. Art and design are universally important.
The Japanese government has planned by 2020 to introduce the Finnish Neuvola System, a fundamental social childcare system that covers the period of pregnancy to child care. The purpose of this research is to clarify the conditions for high quality of Neuvola service, comparing childcare of Finland and Japan. First, the social systems of Finland and Japan, legal actions and other related social backgrounds are covered. Following this, the results are analyzed. Secondly, the results of interviews in Finland with Neuvola public health nurses and three typical Neuvola users, including a father, mother, and pregnant woman are presented. As a result of survey, six conditions were identified as the basis of Neuvola services: personal health checks, facility preparation, pleotropic care, communication through mutual dialogue, customized information and management of service provider quality. In a society where nuclear families are increasing, it is harder to care for children without someone’s support. In comparing Finnish and Japanese childcare systems, the Finnish system perceives childcare as a social matter. In the Neuvola System, people are always open to discuss about any worries or queries. In Japan, the system is closed toward personal matters and private treatment options are not adequate. This is a major factor in larger problems that exist in the Japanese system.
The results are discussed in relation to previous studies of participatory roles in social health care services in the Japanese government and users of these services, leading to the proposal of a Japanese childcare service design.
The concept of design thinking has received increasing attention during recent years, particularly from managers around the world. However, despite being the subject of a vast number of articles and books stating its importance, the effectiveness of this approach is unclear, as the claims about the concept are not grounded on empirical studies or evaluations. In this study, we investigated the perceptions of six design thinking methods of 21 managers in the agriculture industry as they explored employee and business-related problems and solutions using these tools in a 6-hour workshop. The results from pre and post-survey responses suggest that the managers agreed on the value design thinking could bring to their own domains and were able to articulate on how they can use them in solving problems. We conclude by proposing directions for research to further explore adaptation of design thinking for the management practice context.