Refine
H-BRS Bibliography
- no (687) (remove)
Departments, institutes and facilities
Document Type
- Conference Object (687) (remove)
Year of publication
Sprachassistenten wie Alexa oder Google Assistant sind aus dem Alltag vieler VerbraucherInnen nicht mehr wegzudenken. Sie überzeugen insbesondere durch die sprachbasierte und somit freihändige Steuerung und mitunter auch den unterhaltsamen Charakter. Als häuslicher Lebensmittelpunkt sind die häufigsten Aufstellungsorte das Wohnzimmer und die Küche, da sich Haushaltsmitglieder dort die meiste Zeit aufhalten und das alltägliche Leben abspielt. Dies bedeutet allerdings ebenso, dass an diesen Orten potenziell viele Daten erfasst und gesammelt werden können, die nicht für den Sprachassistenten bestimmt sind. Demzufolge ist nicht auszuschließen, dass der Sprachassistent – wenn auch versehentlich – durch Gespräche oder Geräusche aktiviert wird und Aufnahmen speichert, selbst wenn eine Aktivierung unbewusst von Anwesenden bzw. von anderen Geräten (z. B. Fernseher) erfolgt oder aus anderen Räumen kommt. Im Rahmen eines Forschungsprojekts haben wir dazu NutzerInnen über Ihre Nutzungs- und Aufstellungspraktiken der Sprachassistenten befragt und zudem einen Prototyp getestet, der die gespeicherten Interaktionen mit dem Sprachassistenten sichtbar macht. Dieser Beitrag präsentiert basierend auf den Erkenntnissen aus den Interviews und abgeleiteten Leitfäden aus den darauffolgenden Nutzungstests des Prototyps eine Anwendung zur Beantragung und Visualisierung der Interaktionsdaten mit dem Sprachassistenten. Diese ermöglicht es, Interaktionen und die damit zusammenhängende Situation darzustellen, indem sie zu jeder Interaktion die Zeit, das verwendete Gerät sowie den Befehl wiedergibt und unerwartete Verhaltensweisen wie die versehentliche oder falsche Aktivierung sichtbar macht. Dadurch möchten wir VerbraucherInnen für die Fehleranfälligkeit dieser Geräte sensibilisieren und einen selbstbestimmteren und sichereren Umgang ermöglichen.
Zumutbarkeit von Arbeit
(1994)
XML Encryption and XML Signature are fundamental security standards forming the core for many applications which require to process XML-based data. Due to the increased usage of XML in distributed systems and platforms such as in SOA and Cloud settings, the demand for robust and effective security mechanisms increased as well. Recent research work discovered, however, substantial vulnerabilities in these standards as well as in the vast majority of the available implementations. Amongst them, the so-called XML Signature Wrapping attack belongs to the most relevant ones. With the many possible instances of this attack type, it is feasible to annul security systems relying on XML Signature and to gain access to protected resources as has been successfully demonstrated lately for various Cloud infrastructures and services. This paper contributes a comprehensive approach to robust and effective XML Signatures for SOAP-based Web Services. An architecture is proposed, which integrates the r equired enhancements to ensure a fail-safe and robust signature generation and verification. Following this architecture, a hardened XML Signature library has been implemented. The obtained evaluation results show that the developed concept and library provide the targeted robustness against all kinds of known XML Signature Wrapping attacks. Furthermore the empirical results underline, that these security merits are obtained at low efficiency and performance costs as well as remain compliant with the underlying standards.
This paper describes a codesign environment based on the WWW (World Wide Web) and its implementation. Tool invocations and their respective results are linked using hypertext documents. We show how to configure a WWW browser for spawning design tools and how frequent tasks like documentation generation and retrieval are facilitated. The design flow can be adopted to the given application very easily. In addition we introduce the concept of a work flow called ‘design by documentation’. A WWW link to the results is given and experience using it in a codesign project is described.
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde Technologien. Sicherheit ist bei der Anschaffung von Software und Technikprodukten zwar eines der zentralen Auswahlkriterien – aufgrund mangelnder Gebrauchstauglichkeit werden die vorhandenen Sicherheitsfunktionen und -mechanismen von den Nutzern jedoch oft falsch oder überhaupt nicht bedient. Im alltäglichen Gebrauch ergeben sich hierdurch Sicherheitsgefährdungen beim Umgang mit IKT-Systemen bzw. -Produkten und den darin enthaltenen sensiblen Daten. Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben. Ergebnis des Workshops ist ein Positionspapier, in dem die aktuellen Problemfelder und die wichtigsten Herausforderungen aus Sicht der Usability und UX Professionals beschrieben sind.
Wissenschaftliches Rechnen
(1999)
In education, finding the appropriate learning pace that fits to the members of a large group is a challenging task. This becomes especially evident when teaching multidisciplinary subjects such as epidemiology in medicine or computer science in most study programs, since lecturers have to face a very heterogeneous state of previous knowledge. Approaching this issue requires an individual supervision of each and every student, which is obviously bounded by the available resources. Moreover, when referring back to the second example, writing computer programs requires a complex installation and configuration of development tools. Many beginning programmers already become stuck at this entry stage. This paper introduces WHELP, a Web-based Holistic E-Learning Platform, which provides an integrated environment enabling the learning and teaching of computer science topics without the need to install any software. Moreover, WHELP includes an interactive feedback system for each programming exercise, where lecturers or tutors can supply comments, improvements, code assistance or tips helping the students to accomplish their tasks. Furthermore, WHELP offers a statistical analysis module as well as a real-time classroom polling system both promoting an overview of the state of knowledge of a course. In addition to that, WHELP enables collaborative working including code-sharing and peer-to-peer learning. This feature enables students to work on exercises simultaneously at distinct places. WHELP has been successfully deployed in the winter term 2013 at the Cologne University of Applied Sciences supporting the 120 students and 3 lecturers to learn and teach basic topics of computer science in an engineering study program.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
Echtzeit-orientierte Multimedia-Kommunikation im Internet eröffnet eine Vielzahl neuer Anwendungen. Diese innovative Kommunikationsplattform ist gerade für weltweit operierende Unternehmen von Interesse. So können z.B. durch die Verwendung von VoIP-Lösungen oder Groupware-Applikationen Kosten gesenkt und gleichzeitig die Zusammenarbeit der Mitarbeiter optimiert werden. Dies trifft auch für Video-Konferenzsysteme zu. Anstelle regelmäßiger Meetings, die meist mit Dienstreisen eines Großteils der Teilnehmer verbunden sind, können Konferenzen virtuell durch die Übertragung von Sprachund Videodaten über das Internet abgehalten werden. Die Akzeptanz der beschriebenen Kommunikationsanwendungen hängt stark von den Faktoren Dienstgüte und Sicherheit ab. Die Übertragung der echtzeit-orientierten Mediendaten muss möglichst kontinuierlich erfolgen, so dass sowohl eine ruckelfreie Wiedergabe der Sprache als auch der Bewegtbilder möglich ist. Da Konferenzen firmenintern und vertraulich sind, werden sie hinter verschlossener Tür abgehalten. Das Pendant in der elektronischen Welt muss eine Entsprechung anbieten. Se- curity-Mechanismen haben allerdings einen Einfluss auf Dienstgüteparameter. Dies muss bei der Entwicklung von Techniken zum Schutz multimedialer Kommunikation berücksichtigt und abgestimmt werden. Dieser Beitrag zeigt anhand des Beispiels eines Video-Konferenzsystems für das Internet, wie Sicherheitsmechanismen in echtzeit-orientierte Multimedia-Kommunikationsanwendungen unter Berücksichtigung von Quality of Service (QoS) integriert werden können.
This paper describes the development of a Pedelec controller whose performance level (PL) conforms to European standard on safety of machinery [9] and whose soft- ware is verified to conform to EPAC standard [6] by means of a software verification technique called model checking. In compliance with the standard [9] the hardware needs to implement the required properties corresponding to categories “C” and “D”. The latter is used if the breaks are not able to bring the velomobile with a broken motor controller to a full stop. Therefore the controller needs to implement a test unit, which verifies the functionality of the components and, in case of an emergency, shuts the whole hardware down to prevent injuries of the cyclist. The MTTFd can be measured through a failure graph, which is the result of a FMEA analysis, and can be used to proof that the Pedelec controller meets the regulations of the system specification. The analysis of the system in compliance with [9] usually treats the software as a black box thus ignoring its inner workings and validating its correctness by means of testing. In this paper we present a temporal logic specification according to [6], based on which the software for the Pedelec controller is implemented, and verify instead of only testing its functionality. By means of model checking [1] we proof that the software fulfills all requirements which are regulated by its specification.
UTRAN Internet Access
(1999)
Scientific or statistical research has long been the domain of dedicated programming languages such as R, SPSS or SAS. A few years other competitors entered the arena, among them Python with its powerful SciPy package. The following article introduces SciPy by applying a small subset of its functionality to a well-known dataset.
This paper gives necessary foundations to understand the mechanism of warning processing and summarizes the state of the art in warning development. That includes a description of tools, researchers use to work in this scientific field. In detail these are models that describes the human way of processing warnings and mental models. Both are presented detailed with relevant examples. The paper tells how these tools are connected and how they are used to improve the effectiveness of warnings.
In Fortführung zum erfolgreichen Auftaktworkshop „Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten“ auf der Mensch und Computer 2015 werden in einem zweiten wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer vier Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert. Das Programm bilden Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze, aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop wird das etablierte Forum weiterentwickelt, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee hat die Einreichungen bewertet und daraus die zur Präsentation akzeptierten Beiträge ausgewählt.
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und fordert zusätzliche Authentifizierung an, wenn sich Ausprägungen dieser Merkmale signifikant von den bisher bekannten unterscheiden. RBA bietet das Potenzial für gebrauchstauglichere Sicherheit. Bisher jedoch wurde RBA noch nicht ausreichend im Bezug auf Usability, Sicherheit und Privatsphäre untersucht. Dieser Extended Abstract legt das geplante Dissertationsvorhaben zur Erforschung von RBA dar. Innerhalb des Vorhabens konnte bereits eine Grundlagenstudie und eine darauf aufbauende Laborstudie durchgeführt werden. Wir präsentieren erste Ergebnisse dieser Studien und geben einen Ausblick auf weitere Schritte.
Kontemporäre Service-orientierte Systeme sind hochgradig vernetzt und haben zudem die Eigenschaft massiv-skalierbar zu sein. Diese Charakteristiken stellen im besonderen Maße Anforderungen an die Datensicherheit der Anwender solcher Systeme und damit primär an alle Stakeholder der Softwareentwicklung, die in der Verantwortung sind, passgenaue Sicherheitsmechanismen effektiv in die Softwareprodukte zu bringen. Die Effektivität von Sicherheitsarchitekturen in service-orientierten Systemen hängt maßgeblich von der richtigen Nutzung und Integration von Security-APIs durch eine heterogene Gruppe von Softwareentwicklern ab, bei der nicht per se ein fundiertes Hintergrundwissen über komplexe digitale Sicherheitsmechanismen vorausgesetzt werden kann. Die Diskrepanz zwischen komplexen und in der Anwendung fehleranfälligen APIs und einem fehlenden Verständnis für die zugrundeliegenden Sicherheitskonzepte auf Seiten der Nutzer begünstigt in der Praxis unsichere Softwaresysteme. Aus diesem Grund ist die Gebrauchstauglichkeit von Security-APIs besonders relevant, damit Programmierer den benötigten Funktionsumfang effektiv, effizient und zufriedenstellend verwenden können. Abgeleitet von dieser Problemstellung, konzentriert sich das Dissertationsvorhaben auf die gebrauchstaugliche Ausgestaltung von Security-APIs und den Herausforderungen die sich aus den Methoden zur Evaluation der Usability in typischen Umgebungen der Softwareentwicklung ergeben.
While universities are mandated to teach, research and do community outreach, studies reveal that typical university communities live in relative isolation where research is more basic than applied. This study focused on; 1) determining how WWE could be fostered through linkages between universities and external agencies (communities, public and private sectors); 2) establishing how universities’ resources could be optimized to promote research and capacity building for WWE. The dimensions of WWE studied were; 1) Technical & Business Models; 2) Capacity building; and 3) institutional frameworks. Baseline studies were conducted in which qualitative and quantitative data was collected through questionnaires, interviews, documents analysis. Experimentations were carried out whereby Laboratory tests on Bio-methane Potential (BMP) for different biomass types was conducted. A complete chain of briquettes production and consumption has been successfully piloted at St Kizito High School in Namugongo, near Kampala. The 20,000 kg of briquettes produced (from municipal bio-waste) by students monthly are used to cook in three schools whose total population is 2000 students. With an average net profit of $ 3000, the project makes business sense even in absence of social-benefit accounting. Based on start-up capital of $ 12,250, the payback period on investment is 14.7 months. Bio-char (from carbonized waste) and briquette-ash are used as organic fertilizers and biocide in vegetable gardens at the schools. New pathways for municipal waste management based on stakeholder engagement and entrepreneurship are demonstrated; departing from the conventional waste collection and disposal models. This circular enterprise which enhances Food, Agriculture, Biodiversity, Land-use and Energy (FABLE) nexus will scale-up to incorporate non-student communities (youths/women), private waste-collectors and entrepreneurs. The application of entrepreneurial models for engaging students in green enterprises integrates technological, social, economic and governance dimensions for promoting municipal sanitation, environment; energy and food security.
The formulation of transport network problems is represented as a translation between two domain specific languages: from a network description language, used by network simulation community, to a problem description language, understood by generic non-linear solvers. A universal algorithm for this translation is developed, an estimation of its computational complexity given, and an efficient application of the algorithm demonstrated on a number of realistic examples. Typically, for a large gas transport network with about 10K elements the translation and solution of non-linear system together require less than 1 sec on the common hardware. The translation procedure incorporates several preprocessing filters, in particular, topological cleaning filters, which accelerate the solution procedure by factor 8.
Recent advances in digital game technology are making stereoscopic games more popular. Stereoscopic 3D graphics promise a better gaming experience but this potential has not yet been proven empirically. In this paper, we present a comprehensive study that evaluates player experience of three stereoscopic games in comparison with their monoscopic counterparts. We examined 60 participants, each playing one of the three games, using three self-reporting questionnaires and one psychophysiological instrument. Our main results are (1) stereoscopy in games increased experienced immersion, spatial presence, and simulator sickness; (2) the effects strongly differed across the three games and for both genders, indicating more affect on male users and with games involving depth animations; (3) results related to attention and cognitive involvement indicate more direct and less thoughtful interactions with stereoscopic games, pointing towards a more natural experience through stereoscopy.
Trust and Social Capital: Revisiting an Offshoring Failure Story of a Small German Software Company
(2009)
The Waveform Relaxation Method (WRM) is introduced as a generalization of different methods used in circuit simulation. Next we present an algorithm to partition the network using so called signal flow graphs and its implementation in the experimental simulator SISAL. At last some new concepts to enhance the performance of the WRM are presented and first results are reported.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Towards self-explaining social robots. Verbal explanation strategies for a needs-based architecture
(2019)
In order to establish long-term relationships with users, social companion robots and their behaviors need to be comprehensible. Purely reactive behavior such as answering questions or following commands can be readily interpreted by users. However, the robot's proactive behaviors, included in order to increase liveliness and improve the user experience, often raise a need for explanation. In this paper, we provide a concept to produce accessible “why-explanations” for the goal-directed behavior an autonomous, lively robot might produce. To this end we present an architecture that provides reasons for behaviors in terms of comprehensible needs and strategies of the robot, and we propose a model for generating different kinds of explanations.
As soon as data is noisy, knowledge as it is represented in an information system becomes unreliable. Features in databases induce equivalence relations—but knowledge discovery takes the other way round: given a relation, what could be a suitable functional description? But the relations we work on are noisy again. If we expect to record data for learning a classification of objects then it can well be the real data does not create a reflexive, symmetric and transitive relation although we know it should be. The usual approach taken here is to build the closure in order to ensure desired properties. This, however, leads to overgeneralisation rather quickly.
Towards explaining deep learning networks to distinguish facial expressions of pain and emotions
(2018)
Deep learning networks are successfully used for object and face recognition in images and videos. In order to be able to apply such networks in practice, for example in hospitals as a pain recognition tool, the current procedures are only suitable to a limited extent. The advantage of deep learning methods is that they can learn complex non-linear relationships between raw data and target classes without limiting themselves to a set of hand-crafted features provided by humans. However, the disadvantage is that due to the complexity of these networks, it is not possible to interpret the knowledge that is stored inside the network. It is a black-box learning procedure. Explainable Artificial Intelligence (AI) approaches mitigate this problem by extracting explanations for decisions and representing them in a human-interpretable form. The aim of this paper is to investigate the explainable AI method Layer-wise Relevance Propagation (LRP) and apply it to explain how a deep learning network distinguishes facial expressions of pain from facial expressions of emotions such as happiness and disgust.
Despite the lack of standardisation for building REST-ful HTTP applications, the deployment of REST-based Web Services has attracted an increased interest. This gap causes, however, an ambiguous interpretation of REST and induces the design and implementation of REST-based systems following proprietary approaches instead of clear and agreed upon definitions. Issues arising from these shortcomings have an influence on service properties such as the loose coupling of REST-based services via a unitary service contract and the automatic generation of code. To overcome such limitations, at least two prerequisites are required: the availability of specifications for implementing REST-based services and auxiliaries for auditing the compliance of those services with such specifications. This paper introduces an approach for conformance testing of REST-based Web Services. This appears conflicting at the first glance, since there are no specifications available for implementing REST by, e.g., t he prevalent technology set HTTP/URI to test against. Still, by providing a conformance test tool and leaning it on the current practice, the exploration of service properties is enabled. Moreover, the real demand for standardisation gets explorable by such an approach. First investigations conducted with the developed conformance test system targeting major Cloud-based storage services expose inconsistencies in many respects which emphasizes the necessity for further research and standardisation.
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Towards a Generalization of Production Theory - "Soft" Production Functions Using Fuzzy Set Theory
(1992)
The role of tourism entrepreneurship in rural development continues to be a subject of interest and debate among academia and practitioners. Theoretically, it is anticipated that tourism entrepreneurship will lead to livelihood diversification, enhancement and ultimately a revitalization of the rural economy. While tourism is posited as an accessible entrepreneurship pathway, there is a dearth of information regarding rural dwellers’ actual experiences with it, especially within the Ghanaian context. Using a case study approach and qualitative data from Wli; a rural tourism destination in Ghana, this paper delves into the opportunities and concerns associated with tourism entrepreneurship in rural areas. Data was obtained between November and December 2016 from 27 persons who were either tourism enterprise owners or employees. Findings from the study showed that entrepreneurial activities centred on the provision of accommodation, food and beverage, souvenir and guiding services. The nature of the activities enabled easy transfer of existing skills and knowledge. Further, entry into tourism entrepreneurship was perceived to be easy by the majority of study participants. These findings confirm the potential for tourism to be employed in boosting entrepreneurial activities in rural areas. Nevertheless, there were concerns regarding access to credit, institutional support, unhealthy competitions, low incomes, unguaranteed pensions, and seasonality and skewness of demand. These concerns threatened the growth and sustainability of tourism entrepreneurship within the community. From a policy perspective, there is a need for institutional recognition and support for tourism entrepreneurial intentions and activities in rural areas. Practice-wise, credit facilities need to be designed specifically for tourism-related rural enterprises. Further, periodic skills and knowledge augmentation programmes must be initiated to help expand the skill sets for the rural entrepreneurs. Finally, there is a need for the formation of traderelated networks to provide a platform for knowledge and experience sharing among the entrepreneurs.
While 14 % of the world's working-age population currently lives in sub-Saharan Africa (SSA), this figure will predictably be higher than the rest of the world combined by 2036. If this demographic group finds meaningful employment, Africa experiences an economic and social upswing. To tap this potential, the paper intends to answer the research question, "What are the prerequisites and how are they defined for the successful implementation of sustainable business model ideas in SSA?", by developing a top ten ranking consisting of previously identified sustainable business model ideas best suited for productive use. This achieves a novel approach to implementing future-oriented business models and contributes to current research on sustainable models. Since the geographical scope of SSA is pervasive, this paper focuses on Namibia, Rwanda, Senegal, and Uganda. An extensive literature review on these countries was conducted to gain a broader understanding of the situation in SSA. Additionally, research was carried out on the agricultural, energy, and information and communications technology (ICT) sectors to identify the most promising ideas. To contribute to current knowledge, experts were interviewed, and panel discussions were analyzed. Furthermore, the Business Model Canvas (BMC) was combined with the circular economy concept, which served as a framework for the business model ideas. Experts evaluated these ideas, which were subsequently ranked using fuzzy logic with artificial intelligence, based on the system for exploring country risks (CRISK-Explorer). The paper shows that skipping individual development processes opens up promising opportunities, such as the ICT-based business model e-crowd logistics or the renewable energy-based model e-Boda-Boda. Seven prerequisites for the successful implementation of these ideas were identified and defined: value delivery, promising customers, sufficient capital, presence of key resources, possibility to perform the key activities, sustainability, and profitability. The paper concludes by identifying limitations and suggesting avenues for future research.
The usage of link quality based routing metrics significantly improves the quality of the chosen paths and by that the performance of the network. But, attackers may try to exploit link qualities for their purposes. Especially in tactical multi-hop networks, routing may fall prey to an attacker. Such routing attacks are a serious threat to communication. TOGBAD is a centralised approach, using topology graphs to detect routing attacks. In this paper, we enhance TOGBAD with the capability to detect fake link qualities. We use a Challenge/Response method to estimate the link qualities in the network. Based on this, we perform plausibility checks for the link qualities propagated by the nodes in the network. Furthermore, we study the impact of attackers propagating fake link qualities and present simulation results showing TOGBAD's detection rate.
Tourism in Rwanda is challenging. Since the country is small and hilly, it is difficult to tap the potential. As the country is blessed with diverse nature, the Rwandan government decided to combine ecotourism with high-end tourism, to exploit the full potential. This study aims to assess the extent to which these two types of tourism fit together, as well as if sustainability is a decisive argument in this upscale segment. In this context, ecotourism is characterized by its 3 core criteria: education, nature and sustainability. To evaluate the main question: to what extent can ecotourism projects help to promote the perception of Rwanda as a high-end tourist destination on the German market? As well as if sustainability is a decisive argument, interviews with stakeholder from the Rwandan tourism industry as well as German tour operators were conducted, to gain an understanding of both sites and then evaluate them according to the 3 ecotourism core criteria and the demands of high-end tourists. The results showed that there is a difference in the perception of the needs of high-end tourists. While the 3 core criteria seem to be too relevant while they are in booking decision with the tour operator. The high-end lodges in Rwanda state an interest in these three criteria. It is evident from the results that there is a limited active demand for sustainable tourist products, while nature and education are more relevant, but not yet fully exploited. However, all interviewees indicated that ecotourism, and in particular sustainability, is experiencing an increase in demand and will continue to grow in importance in the future. Accordingly, the results suggest the driving markets approach is relevant to further drive demand in that segment.
Studies in entrepreneurship education in hospitality and tourism has indicated that further attention could be given toward helping students to develop creativity and critical thinking skills, engage in deeper self-discovery experiences, and understand tourism more fully to help prepare them for entrepreneurial roles. This study aims at evaluating Hospitality entrepreneurial modules offered in Tourism programs in Ghanaian institutions. The curriculum of Tourism in two tertiary institutions in Ghana offering Tourism is studied. The research highlights on the need to integrate hospitality technical skills into Tourism education to create a culture that will enhance the growth of entrepreneurial hospitality into Tourism as culinary Tourism is becoming common. Some of the challenges faced by tourism students and entrepreneurship educators are highlighted. Structured interview technique was used to collect data from 20 purposive sampled students of the selected institutions. The results revealed that the level of importance and attention given to hospitality skills in tourism and the perception of students on acquisition of the required competencies is minimal. It is therefore recommended that more skills and competences in hospitality operation, food and beverage production and service be introduced in tourism education in a more holistic manner with emphasis on skill acquisition in order to make the tourism graduate more creative and critical thinker in today’s global competitive environment.
The Whole Is More than the Sum of Its Parts - On Culture in Education and Educational Culture
(2015)
The Learning Culture Survey investigates learners’ expectations towards and perceptions of education on international level with the aim to make culture in the context of education better understandable and support educators to prevent and solve intercultural conflicts in education. So far, we found that culture-related expectations differ between educational settings, depend on the age of the learners, and that a nationally homogenous educational culture is rather an exception than the rule. The results of our recently completed longitudinal study provided evidence that educational culture on the institutional level actually is persistent, at least over a term of four years. After a brief introduction of the general background, we will subsume the steps taken during the past seven years and achieved general insights regarding educational culture. Last, we will introduce a method for the determination of conflict potential, which bases on the understanding of culture as the level to w hich people within a society accept deviations from the usual. We close with demonstrating the method’s functionality on examples from the Learning Culture Survey.
Namibia’s hunting industry is increasingly threatened by animal rightists and opponent groups whose adversarial mindset is mostly based on emotion orientated information. The fatal consequences if closing hunting tourism in a country like Namibia are expounded in this study by critically investigating the input of well-regulated hunting tourism towards conservation in Namibia. Different factors have to be taken into consideration, regarding the country’s attributes that differ significantly from other countries and their methods to achieve successful conservation management strategies. By conducting an in-depth interview with Mr. Volker Grellmann and by obtaining secondary data from local authorities and organizations, the current research investigates how well-regulated hunting tourism in Namibia is an important part of biodiversity conservation. The results outline that hunting tourism is crucial for the value of wildlife and yields for wildlife to have a greater benefit than livestock and crop farming in Namibia. Likewise, the country takes care of their valuable natural recourse. As a result, natural habitats are induced, and subsequently a steeply growing number of wildlife was recorded over the last 50 years in Namibia. Among others hunting tourism favors the development of rural areas and yields incentives to fight poaching and the illegal trade of wild animal products.
Rural Social Entrepreneurship (RSE) is considered an essential factor for achieving Sustainable Rural Development (SRD) and improving rural people's socio-economic status through increasing production, productivity, reducing unemployment, and accelerating the progress in achieving SDGs. The paper aims at examining the role of social entrepreneurship in achieving (SRD) in Sudan with reference to Wad Balal Project for investment and rural development in Gezira State, which established in 2005 in small villages in Gezira State through mobilizing of local savings and resources for creating job opportunities, sponsoring poor households, improving the infrastructures, and reducing poverty. The study depends on cross-sectional data collected through a questionnaire and focus group discussion from 100 head of households in the village under research. A questionnaire is internally consistent, and its questions are stable. Frequencies and percentages have been used for describing the basic characteristics of the respondents. Statistical t-test was adopted to test the opinions of respondents about the role of the project based on the Likert scale. The results revealed that the project has significantly increased the opportunities of job and training as well as household income, the results also confirmed that the project has improved the status of education and health services in the village. The project has extended and established many branches; the project also diversified its investment to cover more kinds of investments, the project reinvested 50% of its profits and directed the rest to charity, and social services in the village, many lessons can be learned from the project story. The research recommended that a similar social entrepreneurship project can be generalized to more villages in Sudan and other developing countries to accelerate sustainable rural development. Local communities have to support similar initiatives for developing their villages.