Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Size: px
Start display at page:

Download "Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30"

Transcription

1 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE IEEE WORLD FORUM ON INTERNET OF THINGS / 30

2 Agenda Introduction Related Work Privacy Preferences in IoT Privacy Preference Collection Privacy Preference Analysis Interpretation of Privacy in IoT Limitations and Future Work Conclusion IEEE WORLD FORUM ON INTERNET OF THINGS / 30

3 Introduction (1/4) Internet of Things (IoT) Networked computing environment consisting of diverse physical objects Collection of personal information with minimum user intervention Privacy in IoT IoT gives benefits, but can compromise user privacy Privacy is important issue for more widespread use of IoT Lack of efforts to fully understand users privacy concerns in IoT Home Automation in IoT Privacy Concerns in IoT IEEE WORLD FORUM ON INTERNET OF THINGS / 30

4 Introduction (2/4) Privacy Preference Collection We collected users privacy preferences about IoT scenarios via online survey IoT scenarios Privacy Preferences IEEE WORLD FORUM ON INTERNET OF THINGS / 30

5 Introduction (3/4) Privacy Preference Analysis We performed a cluster analysis on the collected privacy preferences We identified 4 distinct clusters of scenarios wrt. potential privacy risks IoT scenarios Privacy Preferences Clustered Preferences (K=4) K-modes clustering algorithm IEEE WORLD FORUM ON INTERNET OF THINGS / 30

6 Introduction (4/4) Interpretation of Privacy in IoT We found some relationships btw. IoT contexts and users privacy preferences IoT scenarios People have privacy concerns in case Privacy Preferences Clustered Preferences (K=4) Privacy-invasive Contexts in IoT K-modes clustering algorithm IEEE WORLD FORUM ON INTERNET OF THINGS / 30

7 Related Work Privacy Preference Analysis in UbiComp Privacy preference determinants in ubiquitous computing (ACM CHI 03) A survey of private moments in the home (ACM UbiComp 11) Capturing location-privacy preferences (Personal and Ubiquitous Computing 11) A personal location system with protected privacy in IoT (IEEE BNMT 11) Insights Identity of information requester is important No tracking personal behavior at home Full control of location sharing Active location sharing in emergency situations How people make privacy decisions in IoT environments? More diverse contextual factors need to be considered IEEE WORLD FORUM ON INTERNET OF THINGS / 30

8 Privacy Preferences in IoT 1. DATA COLLECTION 2. DATA ANALYSIS 3. INTERPRETATION IEEE WORLD FORUM ON INTERNET OF THINGS / 30

9 Data Collection (1/5) Previous Works 1 We defined contextual parameters that construct IoT scenarios where what who reason persistence We defined reaction parameters that indicate users privacy preferences _notification _permission _comfort _risk _appropriateness 1: HCI in Business: A collaboration with academia in IoT privacy (HCIB 2015) IEEE WORLD FORUM ON INTERNET OF THINGS / 30

10 Data Collection (2/5) Contextual Parameters A device of a friend (C 3 =3) records your voice to check your presence (C 2 =9). This happens once (C 5 =0), while you are at semi-public place (C 1 =2), for your safety (C 4 =1). Sample IoT Scenario IEEE WORLD FORUM ON INTERNET OF THINGS / 30

11 Data Collection (3/5) Reaction Parameters Would you want to allow this monitoring? Sample Question allow, always (R 2 =1) allow, just this time (R 2 =2) reject, just this time (R 2 =3) reject, always (R 2 =4) Sample Answer Options IEEE WORLD FORUM ON INTERNET OF THINGS / 30

12 Data Collection (4/5) Online Survey Study We recruited 200 participants on Amazon Mechanical Turk (MTurk) US resident, English speaker, high reputation at Amazon MTurk 100 females/99 males (1 unknown), majority (57.5%) are aged We educated them about IoT (e.g., definition, application scenario, etc) Online Survey System (Amazon MTurk) IoT IEEE WORLD FORUM ON INTERNET OF THINGS / 30

13 Data Collection (5/5) Online Survey Study (Cont d) We created scenarios via random permutation of contextual parameter values We individually asked for their reactions and opinions on the given scenarios We collected privacy preferences for 2,800 IoT scenarios IoT Scenario A device of a friend records your voice to check your presence. This happens once, while you are at semi-public place, for your safety. Online Survey System (Amazon MTurk) Question Would you want to allow this monitoring? Privacy Preference I m willing to allow it just this time. Participants IEEE WORLD FORUM ON INTERNET OF THINGS / 30

14 Data Analysis (1/5) K-means Clustering Algorithm Most popular data mining technique to partition observations into K clusters Restricted to continuous numeric values (e.g., , , ) K-modes Clustering Algorithm Variant of K-means to directly cluster categorical data Replacing cluster means with modes Using the simple matching dissimilarity function instead of the Euclidean distance function Updating modes with the most frequent categorical attributes in each clustering step Contextual Parameters Reaction Parameters K-means K-modes C 1 C 2 C 3 C 4 C 5 R 1 R 2 R 3 R 4 R Our Dataset IEEE WORLD FORUM ON INTERNET OF THINGS / 30

15 SE Data Analysis (2/5) Selecting the Number of Clusters We heuristically searched for the optimal K We computed the sum of errors (SE) of the clustering while increasing K from 2 to 10 SE is the sum of the distance btw. each member of the cluster and the cluster s centroid where x is a data point belonging to the ith cluster and c i is the mode of the ith cluster We found the largest decrease in errors (SE K-1 - SE K ) occurs when we increase K from 3 to 4 Sum of Errors Largest Error Decrease (K=4) K IEEE WORLD FORUM ON INTERNET OF THINGS / 30

16 Data Analysis (3/5) Clustering Results 4 clusters differ from each other primarily in contextual parameters: what (C 2 ) and who (C 3 ) Each mode has unique and identical values for reaction parameters: _comfort (R 3 ), _risk (R 4 ), _appropriateness (R 5 ) Modes of Clusters IEEE WORLD FORUM ON INTERNET OF THINGS / 30

17 Data Analysis (4/5) Labeling of Clusters We labeled each cluster using reaction parameters R 3, R 4, R 5 E.g., cluster 1 as Acceptable because its mode has the second highest value for R 3, R 4, R 5 We assigned colors to clusters green (CL 1 ), yellow (CL 2 ), red (CL 3 ), black (CL 4 ) Cluster distribution Acceptable (12.6%) vs. Very Unacceptable (40.8%) 1 Very inappropriate 2 Inappropriate 3 Somewhat inappropriate 4 Neutral 5 Somewhat appropriate 6 Appropriate 7 Very appropriate _appropriateness (R 5 ) Modes of Clusters IEEE WORLD FORUM ON INTERNET OF THINGS / 30

18 "_APPROPRIATENESS" 1: very inappripriate, 4: neutral, 7: very appropriate) Data Analysis (5/5) Verification of Clustering Results Welch s t-tests on reaction parameters in {CL 1, CL 2 }, {CL 2, CL 3 }, {CL 3, CL 4 } Reaction parameter values between each pair of clusters are statistically distinct (p < 0.016) Clusters are distinct from each other in terms of user reactions to the scenarios Information visualization We projected all data entries onto a 2-d space using R 5 values as their coordinates Scenarios that respondents deemed appropriate (R 5 =6, 7) mostly became clustered into CL 1 (green) Visualization of Clustering Results "_APPROPRIATENESS" (1: very inappripriate, 2: inappropriate, 3: somewhat inappropriate, 4: neutral, 5: somewhat appropriate, 6: appropriate, 7: very appropriate) Scenarios that respondents deemed very inappropriate (R 5 =1) mostly became clustered into CL 4 (black) HOSUB LEE ADVANCEMENT TO CANDIDACY 18 / 30

19 "WHERE" PARAMETER Interpretation where Findings Monitoring at personal places is very unacceptable Monitoring at public spaces is unacceptable Monitoring at semi-public spaces is somewhat unacceptable p: chi-square test of association d: effect size (large if d > 0.6) [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 3: public space p <.0001, d = : semi-public space p <.0001, d = : someone else's place 0: your place p <.0001, d = % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

20 RELATIVE FREQUENCY Interpretation what (1/2) Findings Gaze monitoring is very unacceptable Photo-taking or video monitoring is unacceptable 100% [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 90% 80% 70% 60% 50% 40% 30% 20% p <.0001, d = p = , d = % 0% "WHAT" PARAMETER IEEE WORLD FORUM ON INTERNET OF THINGS / 30

21 RELATIVE FREQUENCY Interpretation what (2/2) Findings Voice monitoring for gender and location awareness is tolerable Personally identifiable information (e.g., phone ID) is okay to share p <.0001, d = % 90% 80% [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable p = , d = % 60% 50% 40% 30% 20% 10% 0% "WHAT" PARAMETER IEEE WORLD FORUM ON INTERNET OF THINGS / 30

22 "WHO" PARAMETER Interpretation who (1/2) Findings Monitoring by unknown entity is very unacceptable Monitoring by government or nearby business is unacceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 7. government p <.0001, d = employer/school 5. business p <.0001, d = own device 3. friend 2. colleague 1. unknown p <.0001, d = % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

23 "WHO" PARAMETER Interpretation who (2/2) Findings Monitoring by friends is fine Monitoring by own devices is acceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 7. government 6. employer/school 5. business 4. own device p <.0001, d = friend p <.0001, d = colleague 1. unknown 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

24 "REASON" PARAMETER Interpretation reason (1/2) Findings Purposeless IoT services are unacceptable Some purposeless scenarios are still considered acceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 6. not specified p <.0001, d = health 4. convenience 3. social 2. commercial 1. safety 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

25 "REASON" PARAMETER Interpretation reason (2/2) Findings Convenience is the most significant reason to allow monitoring Safety is also a reasonable justification to allow monitoring [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 6. not specified 5. health 4. convenience 3. social 2. commercial 1. safety 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

26 "PERSISTENCE" PARAMETER Interpretation persistence Findings No clear tendency was observed Participants have privacy concerns about continuous monitoring in general [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 1. continuously 0. once 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30

27 Limitations and Future Work (1/2) Out-of-Context Attitudinal Study Some contextual parameters were coarsely defined E.g., someone else s place might be interpreted differently by participants Participants responded at a location that has no association w/ the scenarios Decreased sense of realism to the scenarios IoT at School? A device of a friend (C 3 =3) records your voice to check your presence (C 2 =9). This happens once (C 5 =0), while you are at someone else s place (C 1 =1), Where is this? for your safety (C 4 =1). IoT Scenario Survey at Home IEEE WORLD FORUM ON INTERNET OF THINGS / 30

28 Limitations and Future Work (2/2) Location-based Survey Simulation of user experience in virtual IoT environments Creating realistic IoT scenarios mapped to real locations through crowdsourcing Building wearable system presents the IoT scenarios related to users current locations Asking users to answer questions on the scenarios while walking around a specific area Wearable Computer Location Awareness Survey IEEE WORLD FORUM ON INTERNET OF THINGS / 30

29 Conclusion In This Paper We aimed to understand user privacy in IoT environments We collected people s privacy preferences toward IoT via online survey We analyzed the collected survey responses via data mining technique IoT scenarios can be grouped into 4 clusters wrt. their potential privacy risks Clustering results are statistically and visually sound We uncovered contextual factors impact people s privacy perceptions who and what are the most important factors We plan to conduct location-based survey study (field experiments) More suitable for collecting sincere responses from users than a traditional survey IEEE WORLD FORUM ON INTERNET OF THINGS / 30

30 Thank You! ANY QUESTIONS? IEEE WORLD FORUM ON INTERNET OF THINGS / 30

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space , pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department

More information

2007 Census of Agriculture Non-Response Methodology

2007 Census of Agriculture Non-Response Methodology 2007 Census of Agriculture Non-Response Methodology Will Cecere National Agricultural Statistics Service Research and Development Division, U.S. Department of Agriculture, 3251 Old Lee Highway, Fairfax,

More information

Measuring User Experience through Future Use and Emotion

Measuring User Experience through Future Use and Emotion Measuring User Experience through and Celeste Lyn Paul University of Maryland Baltimore County 1000 Hilltop Circle Baltimore, MD 21250 USA cpaul2@umbc.edu Anita Komlodi University of Maryland Baltimore

More information

Understanding Requirements. Slides copyright 1996, 2001, 2005, 2009, 2014 by Roger S. Pressman. For non-profit educational use only

Understanding Requirements. Slides copyright 1996, 2001, 2005, 2009, 2014 by Roger S. Pressman. For non-profit educational use only Chapter 8 Understanding Requirements Slide Set to accompany Software Engineering: A Practitioner s Approach, 8/e by Roger S. Pressman and Bruce R. Maxim Slides copyright 1996, 2001, 2005, 2009, 2014 by

More information

Autonomic gaze control of avatars using voice information in virtual space voice chat system

Autonomic gaze control of avatars using voice information in virtual space voice chat system Autonomic gaze control of avatars using voice information in virtual space voice chat system Kinya Fujita, Toshimitsu Miyajima and Takashi Shimoji Tokyo University of Agriculture and Technology 2-24-16

More information

Crowdsourcing and Its Applications on Scientific Research. Sheng Wei (Kuan Ta) Chen Institute of Information Science, Academia Sinica

Crowdsourcing and Its Applications on Scientific Research. Sheng Wei (Kuan Ta) Chen Institute of Information Science, Academia Sinica Crowdsourcing and Its Applications on Scientific Research Sheng Wei (Kuan Ta) Chen Institute of Information Science, Academia Sinica PNC 2009 Crowdsourcing = Crowd + Outsourcing soliciting solutions via

More information

Social Interaction Design (SIxD) and Social Media

Social Interaction Design (SIxD) and Social Media Social Interaction Design (SIxD) and Social Media September 14, 2012 Michail Tsikerdekis tsikerdekis@gmail.com http://tsikerdekis.wuwcorp.com This work is licensed under a Creative Commons Attribution-ShareAlike

More information

Sample Surveys. Chapter 11

Sample Surveys. Chapter 11 Sample Surveys Chapter 11 Objectives Population Sample Sample survey Bias Randomization Sample size Census Parameter Statistic Simple random sample Sampling frame Stratified random sample Cluster sample

More information

ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY: THE REALITY, CHALLENGES AND SOLUTIONS

ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY: THE REALITY, CHALLENGES AND SOLUTIONS November 17, 2014 ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY: THE REALITY, CHALLENGES AND SOLUTIONS 1 PREPARE TO BE NOTICED ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY:

More information

Using smartphones for crowdsourcing research

Using smartphones for crowdsourcing research Using smartphones for crowdsourcing research Prof. Vassilis Kostakos School of Computing and Information Systems University of Melbourne 13 July 2017 Talk given at the ACM Summer School on Crowdsourcing

More information

MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games. and Female Gamers.

MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games. and Female Gamers. MMORPGs And Women 1 MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games and Female Gamers. Julia Jones May 3 rd, 2013 MMORPGs And Women 2 Abstract:

More information

Sampling Designs and Sampling Procedures

Sampling Designs and Sampling Procedures Business Research Methods 9e Zikmund Babin Carr Griffin 16 Sampling Designs and Sampling Procedures Chapter 16 Sampling Designs and Sampling Procedures 2013 Cengage Learning. All Rights Reserved. May not

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA

More information

Rubber Hand. Joyce Ma. July 2006

Rubber Hand. Joyce Ma. July 2006 Rubber Hand Joyce Ma July 2006 Keywords: 1 Mind - Formative Rubber Hand Joyce Ma July 2006 PURPOSE Rubber Hand is an exhibit prototype that

More information

Secure and Intelligent Mobile Crowd Sensing

Secure and Intelligent Mobile Crowd Sensing Secure and Intelligent Mobile Crowd Sensing Chi (Harold) Liu Professor and Vice Dean School of Computer Science Beijing Institute of Technology, China June 19, 2018 Marist College Agenda Introduction QoI

More information

Making Privacy Personal: Profiling Users Privacy Management Strategies on Social Networking Sites

Making Privacy Personal: Profiling Users Privacy Management Strategies on Social Networking Sites SESSION ID: SEM-M01 Making Privacy Personal: Profiling Users Privacy Management Strategies on Social Networking Sites Pamela Wisniewski, Ph.D. Assistant Professor University of Central Florida @pamwis

More information

NCSS Statistical Software

NCSS Statistical Software Chapter 147 Introduction A mosaic plot is a graphical display of the cell frequencies of a contingency table in which the area of boxes of the plot are proportional to the cell frequencies of the contingency

More information

Comparative Study of Electoral Systems (CSES) Module 4: Design Report (Sample Design and Data Collection Report) September 10, 2012

Comparative Study of Electoral Systems (CSES) Module 4: Design Report (Sample Design and Data Collection Report) September 10, 2012 Comparative Study of Electoral Systems 1 Comparative Study of Electoral Systems (CSES) (Sample Design and Data Collection Report) September 10, 2012 Country: Poland Date of Election: 09.10.2011 Prepared

More information

Chapter 3 Monday, May 17th

Chapter 3 Monday, May 17th Chapter 3 Monday, May 17 th Surveys The reason we are doing surveys is because we are curious of what other people believe, or what customs other people p have etc But when we collect the data what are

More information

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization

More information

Good Vibrations: Can a Digital Nudge Reduce Digital Overload?

Good Vibrations: Can a Digital Nudge Reduce Digital Overload? Fabian Okeke, Michael Sobolev Φ, Nicola Dell Ψ, Deborah Estrin Cornell Tech, Φ Technion, Ψ The Jacobs Institute [fno2;ms3377;nixdell;de226]@cornell.edu ABSTRACT Digital overuse on mobile devices is a growing

More information

Sampling, Part 2. AP Statistics Chapter 12

Sampling, Part 2. AP Statistics Chapter 12 Sampling, Part 2 AP Statistics Chapter 12 bias error Sampling error is just sampling variation! Bias vs Error BIAS is something that causes your measurements to systematically miss in the same direction,

More information

Investing in Knowledge: Insights on the Funding Environment for Research on Inequality Among Young People in the United States

Investing in Knowledge: Insights on the Funding Environment for Research on Inequality Among Young People in the United States Investing in Knowledge: Insights on the Funding Environment for Research on Inequality Among Young People in the United States KEY FINDINGS Sarah K. Bruch Department of Sociology University of Iowa A William

More information

ICOS: Interactive Clothing System

ICOS: Interactive Clothing System ICOS: Interactive Clothing System Figure 1. ICOS Hans Brombacher Eindhoven University of Technology Eindhoven, the Netherlands j.g.brombacher@student.tue.nl Selim Haase Eindhoven University of Technology

More information

Introduction. Data Source

Introduction. Data Source Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the

More information

Human Computation and Crowdsourcing Systems

Human Computation and Crowdsourcing Systems Human Computation and Crowdsourcing Systems Walter S. Lasecki EECS 598, Fall 2015 Who am I? http://wslasecki.com New to UMich! Prof in CSE, SI BS, Virginia Tech, CS/Math PhD, University of Rochester, CS

More information

A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines

A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines DI Darko Stanisavljevic VIRTUAL VEHICLE DI Michael Spitzer VIRTUAL VEHICLE i-know 16 18.-19.10.2016, Graz

More information

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara Sketching has long been an essential medium of design cognition, recognized for its ability

More information

Sampling Terminology. all possible entities (known or unknown) of a group being studied. MKT 450. MARKETING TOOLS Buyer Behavior and Market Analysis

Sampling Terminology. all possible entities (known or unknown) of a group being studied. MKT 450. MARKETING TOOLS Buyer Behavior and Market Analysis Sampling Terminology MARKETING TOOLS Buyer Behavior and Market Analysis Population all possible entities (known or unknown) of a group being studied. Sampling Procedures Census study containing data from

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Who Invents IT? March 2007 Executive Summary. An Analysis of Women s Participation in Information Technology Patenting

Who Invents IT? March 2007 Executive Summary. An Analysis of Women s Participation in Information Technology Patenting March 2007 Executive Summary prepared by Catherine Ashcraft, Ph.D. National Center for Women Anthony Breitzman, Ph.D. 1790 Analytics, LLC For purposes of this study, an information technology (IT) patent

More information

GE 113 REMOTE SENSING

GE 113 REMOTE SENSING GE 113 REMOTE SENSING Topic 8. Image Classification and Accuracy Assessment Lecturer: Engr. Jojene R. Santillan jrsantillan@carsu.edu.ph Division of Geodetic Engineering College of Engineering and Information

More information

SPECIAL REPORT. The Smart Home Gender Gap. What it is and how to bridge it

SPECIAL REPORT. The Smart Home Gender Gap. What it is and how to bridge it SPECIAL REPORT The Smart Home Gender Gap What it is and how to bridge it 2 The smart home technology market is a sleeping giant and no one s sure exactly when it will awaken. Early adopters, attracted

More information

The Connected Home: Are You Ready?

The Connected Home: Are You Ready? Virtual Round Table Series The Connected Home: Are You Ready? 2017 Rich Binsacca Director + Chief Communicator Housing Innovation Alliance YOUR HOST Rich Binsacca Director + Chief Communicator rich@housinginnovation.org

More information

encompass - an Integrative Approach to Behavioural Change for Energy Saving

encompass - an Integrative Approach to Behavioural Change for Energy Saving European Union s Horizon 2020 research and innovation programme encompass - an Integrative Approach to Behavioural Change for Energy Saving Piero Fraternali 1, Sergio Herrera 1, Jasminko Novak 2, Mark

More information

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies Purpose The standard elaborations (SEs) provide additional clarity when using the Australian Curriculum achievement standard to make judgments on a five-point scale. They can be used as a tool for: making

More information

Section 2: Preparing the Sample Overview

Section 2: Preparing the Sample Overview Overview Introduction This section covers the principles, methods, and tasks needed to prepare, design, and select the sample for your STEPS survey. Intended audience This section is primarily designed

More information

Latest trends in sentiment analysis - A survey

Latest trends in sentiment analysis - A survey Latest trends in sentiment analysis - A survey Anju Rose G Punneliparambil PG Scholar Department of Computer Science & Engineering Govt. Engineering College, Thrissur, India anjurose.ar@gmail.com Abstract

More information

Social Virtual Reality Best Practices. Renee Gittins July 30th, 2018 Version 1.2

Social Virtual Reality Best Practices. Renee Gittins July 30th, 2018 Version 1.2 Social Virtual Reality Best Practices Renee Gittins July 30th, 2018 Version 1.2 1 Contents Contents 2 Introduction 3 Moderation Layers 3 Personal Moderation 3 Personal Moderation Tools 3 Personal Moderation

More information

15-388/688 - Practical Data Science: Visualization and Data Exploration. J. Zico Kolter Carnegie Mellon University Spring 2018

15-388/688 - Practical Data Science: Visualization and Data Exploration. J. Zico Kolter Carnegie Mellon University Spring 2018 15-388/688 - Practical Data Science: Visualization and Data Exploration J. Zico Kolter Carnegie Mellon University Spring 2018 1 Outline Basics of visualization Data types and visualization types Software

More information

Social Network Analysis in HCI

Social Network Analysis in HCI Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it

More information

How to encourage the crowd?

How to encourage the crowd? How to encourage the crowd? A Study about User Typologies and Motivations on Crowdsourcing Platforms Full paper available here: http://dx.doi.org/10.1109/ucc.2013.98 Daniel Schultheiss, Anja Blieske, Anja

More information

Who are your users? Comparing media professionals preconception of users to data-driven personas

Who are your users? Comparing media professionals preconception of users to data-driven personas Who are your users? Comparing media professionals preconception of users to data-driven personas Lene Nielsen IT University Copenhagen Rued Langgaardsvej 7, 2300 Cph, Denmark Lene@itu.dk Soon-Gyo Jung

More information

Introduction. Descriptive Statistics. Problem Solving. Inferential Statistics. Chapter1 Slides. Maurice Geraghty

Introduction. Descriptive Statistics. Problem Solving. Inferential Statistics. Chapter1 Slides. Maurice Geraghty Inferential Statistics and Probability a Holistic Approach Chapter 1 Displaying and Analyzing Data with Graphs This Course Material by Maurice Geraghty is licensed under a Creative Commons Attribution-ShareAlike

More information

TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS

TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS Thong B. Trinh, Anwer S. Bashi, Nikhil Deshpande Department of Electrical Engineering University of New Orleans New Orleans, LA 70148 Tel: (504) 280-7383 Fax:

More information

A Spatiotemporal Approach for Social Situation Recognition

A Spatiotemporal Approach for Social Situation Recognition A Spatiotemporal Approach for Social Situation Recognition Christian Meurisch, Tahir Hussain, Artur Gogel, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser Telecooperation Lab, TU Darmstadt MOTIVATION

More information

It s good to share... Understanding the quality of the 2011 Census in England and Wales

It s good to share... Understanding the quality of the 2011 Census in England and Wales It s good to share... Understanding the quality of the 2011 Census in England and Wales SRA Conference, London, December 2012 Adriana Castaldo Andrew Charlesworth AGENDA Context: 2011 Census quality assurance

More information

COMET: Collaboration in Applications for Mobile Environments by Twisting

COMET: Collaboration in Applications for Mobile Environments by Twisting COMET: Collaboration in Applications for Mobile Environments by Twisting Nitesh Goyal RWTH Aachen University Aachen 52056, Germany Nitesh.goyal@rwth-aachen.de Abstract In this paper, we describe a novel

More information

Jerry Reiter Department of Statistical Science Information Initiative at Duke Duke University

Jerry Reiter Department of Statistical Science Information Initiative at Duke Duke University Jerry Reiter Department of Statistical Science Information Initiative at Duke Duke University jreiter@duke.edu 1 Acknowledgements Research supported by National Science Foundation ACI 14-43014, SES-11-31897,

More information

Labels - Quantified Self App for Human Activity Sensing. Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser

Labels - Quantified Self App for Human Activity Sensing. Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser Labels - Quantified Self App for Human Activity Sensing Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser MOTIVATION Personal Assistance Systems (e.g., Google Now)

More information

The comparison of online game experiences by players in games of Lineage & EverQuest: Role play vs. Consumption

The comparison of online game experiences by players in games of Lineage & EverQuest: Role play vs. Consumption The comparison of online game experiences by players in games of Lineage & EverQuest: Role play vs. Consumption Leo Sang-Min Whang Dept. of Psychology, Yonsei University WidagHall Rm. 43, Yonsei University

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

MAT points Impact on Course Grade: approximately 10%

MAT points Impact on Course Grade: approximately 10% MAT 409 Test #3 60 points Impact on Course Grade: approximately 10% Name Score Solve each problem based on the information provided. It is not necessary to complete every calculation. That is, your responses

More information

Using Online Communities as a Research Platform

Using Online Communities as a Research Platform CS 498 KA Experimental Methods for HCI Using Online Communities as a Research Platform Loren Terveen, John Riedl, Joseph A. Konstan, Cliff Lampe Presented by: Aabhas Chauhan Objective What are Online Communities?

More information

Resume. Specialty: Clustering analysis, Image and Speech Processing, Data Mining

Resume. Specialty: Clustering analysis, Image and Speech Processing, Data Mining Cover Letter Experience for living and studying abroad with strong communication and writing skill in English Solid research background: NOKIA grant and CIMO grant were awarded, participated several international

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

The Design and Application of Public Opinion Monitoring System. Hongfei Long

The Design and Application of Public Opinion Monitoring System. Hongfei Long 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) The Design and Application of Public Opinion Monitoring System Hongfei Long College of Marxism,

More information

Definitions of Ambient Intelligence

Definitions of Ambient Intelligence Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features

More information

1 Dr. Norbert Steigenberger Reward-based crowdfunding. On the Motivation of Backers in the Video Gaming Industry. Research report

1 Dr. Norbert Steigenberger Reward-based crowdfunding. On the Motivation of Backers in the Video Gaming Industry. Research report 1 Dr. Norbert Steigenberger Reward-based crowdfunding On the Motivation of Backers in the Video Gaming Industry Research report Dr. Norbert Steigenberger Seminar for Business Administration, Corporate

More information

Making EFFECTIVE use of LinkedIn for Professional Networking. What is Social Media & Why is it Important? Through your network you can:

Making EFFECTIVE use of LinkedIn for Professional Networking. What is Social Media & Why is it Important? Through your network you can: Making EFFECTIVE use of LinkedIn for Professional Networking Presented by Bryan C Webb, P. Eng. bwebb50@cogeco.ca www.linkedin.com/in/bryanwebb http://twitter.com/bryancwebb Copyright Nov 2009 What is

More information

Game Stages Govern Interactions in Arcade Settings. Marleigh Norton Dave McColgin Dr. Grinter CS

Game Stages Govern Interactions in Arcade Settings. Marleigh Norton Dave McColgin Dr. Grinter CS 1 Game Stages Govern Interactions in Arcade Settings Marleigh Norton 901368552 Dave McColgin 901218300 Dr. Grinter CS 6455 4-21-05 2 The Story Groups of adults in arcade settings interact with game machines

More information

WEB-BASED VR EXPERIMENTS POWERED BY THE CROWD

WEB-BASED VR EXPERIMENTS POWERED BY THE CROWD WEB-BASED VR EXPERIMENTS POWERED BY THE CROWD Xiao Ma [1,2] Megan Cackett [2] Leslie Park [2] Eric Chien [1,2] Mor Naaman [1,2] The Web Conference 2018 [1] Social Technologies Lab, Cornell Tech [2] Cornell

More information

Stats: Modeling the World. Chapter 11: Sample Surveys

Stats: Modeling the World. Chapter 11: Sample Surveys Stats: Modeling the World Chapter 11: Sample Surveys Sampling Methods: Sample Surveys Sample Surveys: A study that asks questions of a small group of people in the hope of learning something about the

More information

Introductory Lesson 2 Internet of Things

Introductory Lesson 2 Internet of Things Introductory Lesson 2 Internet of Things 1 What you will need CloudProfessor (CPF) LED 101 light Overview In this lesson, students will design their own Smart home which utilises the Internet of Things

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

Application of AI Technology to Industrial Revolution

Application of AI Technology to Industrial Revolution Application of AI Technology to Industrial Revolution By Dr. Suchai Thanawastien 1. What is AI? Artificial Intelligence or AI is a branch of computer science that tries to emulate the capabilities of learning,

More information

Designing for End-User Programming through Voice: Developing Study Methodology

Designing for End-User Programming through Voice: Developing Study Methodology Designing for End-User Programming through Voice: Developing Study Methodology Kate Howland Department of Informatics University of Sussex Brighton, BN1 9QJ, UK James Jackson Department of Informatics

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

Regional Workshop on the Use of Electronic Data Collection Technologies in Population and Housing Censuses Bangkok, Jan.

Regional Workshop on the Use of Electronic Data Collection Technologies in Population and Housing Censuses Bangkok, Jan. Regional Workshop on the Use of Electronic Data Collection Technologies in Population and Housing Censuses Bangkok, 23-26 Jan. 2018 1. Overview of MIS in 2015 Census 2. Functions of MIS IT Operation

More information

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting

More information

THE EFFECTS OF PC-BASED TRAINING ON NOVICE DRIVERS RISK AWARENESS IN A DRIVING SIMULATOR

THE EFFECTS OF PC-BASED TRAINING ON NOVICE DRIVERS RISK AWARENESS IN A DRIVING SIMULATOR THE EFFECTS OF PC-BASED TRAINING ON NOVICE DRIVERS RISK AWARENESS IN A DRIVING SIMULATOR Anuj K. Pradhan 1, Donald L. Fisher 1, Alexander Pollatsek 2 1 Department of Mechanical and Industrial Engineering

More information

Digitisation A Quantitative and Qualitative Market Research Elicitation

Digitisation A Quantitative and Qualitative Market Research Elicitation www.pwc.de Digitisation A Quantitative and Qualitative Market Research Elicitation Examining German digitisation needs, fears and expectations 1. Introduction Digitisation a topic that has been prominent

More information

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika

More information

The Socio-Cultural Construction of Ubiquitous Computing. What is UbiComp?

The Socio-Cultural Construction of Ubiquitous Computing. What is UbiComp? The Socio-Cultural Construction of Ubiquitous Computing Jose Rojas University of Glasgow What is UbiComp? The most profound technologies are those that disappear. They weave themselves into the fabric

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

A Day in the Life of the Jos Curriculum Connections. Prince Edward Island

A Day in the Life of the Jos Curriculum Connections. Prince Edward Island A Day in the Life of the Jos Curriculum Connections Prince Edward Island Communication and Information Technology Grade 6 Computer Systems B1.13 identify computer viruses, how they are transmitted and

More information

Beacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology

Beacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology Yaxing Yao SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA yyao08@syr.edu Yun Huang SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA

More information

An Effort to Develop a Web-Based Approach to Assess the Need for Robots Among the Elderly

An Effort to Develop a Web-Based Approach to Assess the Need for Robots Among the Elderly An Effort to Develop a Web-Based Approach to Assess the Need for Robots Among the Elderly K I M M O J. VÄ N N I, A N N I N A K. KO R P E L A T A M P E R E U N I V E R S I T Y O F A P P L I E D S C I E

More information

Dota2 is a very popular video game currently.

Dota2 is a very popular video game currently. Dota2 Outcome Prediction Zhengyao Li 1, Dingyue Cui 2 and Chen Li 3 1 ID: A53210709, Email: zhl380@eng.ucsd.edu 2 ID: A53211051, Email: dicui@eng.ucsd.edu 3 ID: A53218665, Email: lic055@eng.ucsd.edu March

More information

LESSONS LEARNED IN AGILE TRANSFORMATION

LESSONS LEARNED IN AGILE TRANSFORMATION LESSONS LEARNED IN AGILE TRANSFORMATION www.construx.com Construx COPYRIGHT NOTICE These presentation materials are 2016 Construx Software Builders, Inc. All Rights Reserved. No part of the contents of

More information

The entry-level job seeker's guide to salary negotiation

The entry-level job seeker's guide to salary negotiation The entry-level job seeker's guide to salary negotiation This guide At College Recruiter we believe that every student and grad deserves a great career. Every year we help thousands of entry-level candidates

More information

Moonzoo Kim. KAIST CS350 Intro. to SE Spring

Moonzoo Kim. KAIST CS350 Intro. to SE Spring Chapter 7 Requirements Engineering Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs350-07 ac kr/courses/cs350 07 Spring 2008 1 Requirements Engineering-I

More information

It s an illusion to think that everyone is interested in tracking their health.

It s an illusion to think that everyone is interested in tracking their health. Edition September 2017 Smart Health, Wearables It s an illusion to think that everyone is interested in tracking their health. Which lessons were learned from the large-scale survey that imec* carried

More information

Iowa Research Online. University of Iowa. Robert E. Llaneras Virginia Tech Transportation Institute, Blacksburg. Jul 11th, 12:00 AM

Iowa Research Online. University of Iowa. Robert E. Llaneras Virginia Tech Transportation Institute, Blacksburg. Jul 11th, 12:00 AM University of Iowa Iowa Research Online Driving Assessment Conference 2007 Driving Assessment Conference Jul 11th, 12:00 AM Safety Related Misconceptions and Self-Reported BehavioralAdaptations Associated

More information

SOFT 423: Software Requirements

SOFT 423: Software Requirements SOFT 423: Software Requirements Week 5 Class 1 Personas and Interactive Systems SOFT 423 Winter 2015 1 Feedback Survey Don t forget to please fill out the survey! I would appreciate if you could fill it

More information

The Gender Factor in Virtual Reality Navigation and Wayfinding

The Gender Factor in Virtual Reality Navigation and Wayfinding The Gender Factor in Virtual Reality Navigation and Wayfinding Joaquin Vila, Ph.D. Applied Computer Science Illinois State University javila@.ilstu.edu Barbara Beccue, Ph.D. Applied Computer Science Illinois

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

A Service Oriented Definition of Context for Pervasive Computing

A Service Oriented Definition of Context for Pervasive Computing A Service Oriented Definition of Context for Pervasive Computing Moeiz Miraoui, Chakib Tadj LATIS Laboratory, Université du Québec, École de technologie supérieure 1100, rue Notre-Dame Ouest, Montréal,

More information

Inside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques

Inside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques Inside the black-box children rights in the digital age Conceição Costa José Rogado Carla Sousa Sara Henriques Children Rights in the Digital Age The United Nations Convention on the Rights of the Child

More information

AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL

AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL Wallace A. Wood, Bryant University, wwood@bryant.edu Suhong Li, Bryant University, sli@bryant.edu ABSTRACT The new technology product adoption lifecycle (TALC)

More information

Devices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models

Devices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models Devices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models MEGHAN CLARK, University of Michigan, USA MARK W. NEWMAN, University of Michigan, USA PRABAL DUTTA, University

More information

The Tool Box of the System Architect

The Tool Box of the System Architect - number of details 10 9 10 6 10 3 10 0 10 3 10 6 10 9 enterprise context enterprise stakeholders systems multi-disciplinary design parts, connections, lines of code human overview tools to manage large

More information

Code Hunt Contest Analytics. Judith Bishop, Microsoft Research, Redmond USA and team

Code Hunt Contest Analytics. Judith Bishop, Microsoft Research, Redmond USA and team Code Hunt Contest Analytics Judith Bishop, Microsoft Research, Redmond USA and team Working for fun Enjoyment adds to long term retention on a task Discovery is a powerful driver, contrasting with direct

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

Chapter- 5. Performance Evaluation of Conventional Handoff

Chapter- 5. Performance Evaluation of Conventional Handoff Chapter- 5 Performance Evaluation of Conventional Handoff Chapter Overview This chapter immensely compares the different mobile phone technologies (GSM, UMTS and CDMA). It also presents the related results

More information

S.4 Cab & Controls Information Report:

S.4 Cab & Controls Information Report: Issued: May 2009 S.4 Cab & Controls Information Report: 2009-1 Assessing Distraction Risks of Driver Interfaces Developed by the Technology & Maintenance Council s (TMC) Driver Distraction Assessment Task

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602308A Advanced Concepts and Simulation ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 22710 27416

More information

General Secretariat (SG)

General Secretariat (SG) General Secretariat (SG) Geneva, 20 February 2018 Ref: CL-18/08 TSB/AM Contact: Alessia Magliarditi Telephone: +41 22 730 5882 Telefax: E-mail: +41 22 730 5853 kaleidoscope@itu.int To: ITU Member States

More information