miun.sePublications
Change search
Refine search result
12 1 - 50 of 93
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Afrim, Philip
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Kartläggning och identifiering av flaskhalsar inom arbetsprocesser för bagagehantering: Kartlägga och analysera förutsättningarna för en effektivare bagagehanteringsprocess för avgående bagage på Landvetter flygplats med hjälp av VSM, ABC-Analys och processkartläggningar.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Flygplats logistik

  • 2.
    Ansari, Rafay Iqbal
    et al.
    Frederick University, Nicosia, Cyprus.
    Pervaiz, Haris
    Lancaster University, UK.
    Chrysostomou, Chrysostomos
    Frederick University, Nicosia, Cyprus.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Control-Data Separation Architecture for Dual-Band mmWave Networks: A New Dimension to Spectrum Management2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 34925-34937, article id 8663278Article in journal (Refereed)
    Abstract [en]

    The exponential growth in global mobile data traffic, especially with regards to the massive deployment of devices envisioned for the fifth generation (5G) mobile networks, has given impetus to exploring new spectrum opportunities to support the new traffic demands. The millimeter wave (mmWave) frequency band is considered as a potential candidate for alleviating the spectrum scarcity. Moreover, the concept of multi-tier networks has gained popularity, especially for dense network environments. In this article, we deviate from the conventional multi-tier networks and employ the concept of control-data separation architecture (CDSA), which comprises of a control base station (CBS) overlaying the data base station (DBS). We assume that the CBS operates on the sub-6 GHz single band, while the DBS possesses a dual-band mmWave capability, i.e., 26 GHz unlicensed band and 60 GHz licensed band. We formulate a multi-objective optimization (MOO) problem, which jointly optimizes conflicting objectives: the spectral efficiency (SE) and the energy efficiency (EE). The unique aspect of this work includes the analysis of a joint radio resource allocation algorithm based on Lagrangian Dual Decomposition (LDD) and we compare the proposed algorithm with the maximal-rate (maxRx), dynamic sub-carrier allocation (DSA) and joint power and rate adaptation (JPRA) algorithms to show the performance gains achieved by the proposed algorithm.

  • 3.
    Aroka, Annabel
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Hur använder man digitalisering för att uppnå hållbarhet?: En fallstudie om hur arbetet med digitalisering tillämpas på nationell och lokal nivå i ambition att uppnå hållbarhet2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, Sweden's ambition is to be the best in the world to use the possibilities of digitization, while at the same time aiming to be a leader in the work for sustainable development and Agenda 2030. The study aims to study whether there is a clear connection between how the theory of how one should work with digitization to achieve sustainability applies in the practical work at national and local level. Furthermore, one can use the result to identify how one should use digitization and plan for a more sustainable society.

    The aim of the study is to be able to see what differences and / or similarities there are at the different strategic levels, where the study is limited to comparing Sundsvall's municipality with the rest of Sweden.

    The parameters examined are supported by the theory that William Mitchell has written in his book "e-topia", which describes the connection between digitization and sustainability and answers the question of how to achieve sustainability with the help of digitization.

     

    The report is based on a qualitative method, in which the result is gathered from two interviews and two policy documents, respectively, in order to be compared and discussed in the report's concluding discussion and conclusion part. The result shows that it is the human transformation that is of significant importance both at national and local level, but that there is no clear link to the sustainability work in the national digitization strategy. Instead of focusing on what abilities that are required to be able to use digital techniques or technologies, one should instead focus on how digitalization contributes to the sustainability work in order to eliminate unnecessary processes or steps.

     

  • 4.
    Aydogan, Emre
    et al.
    Hacettepe University, Ankara, Turkey.
    Yilmaz, Selim
    Hacettepe University, Ankara, Turkey.
    Sen, Sevil
    Hacettepe University, Ankara, Turkey.
    Butun, Ismail
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Forsström, Stefan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    A Central Intrusion Detection System for RPL-Based Industrial Internet of Things2019In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, article id 8758024Conference paper (Refereed)
    Abstract [en]

    Although Internet-of-Things (IoT) is revolutionizing the IT sector, it is not mature yet as several technologies are  still being offered to be candidates for supporting the backbone of this system. IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is one of those promising candidate technologies to be adopted by IoT and Industrial IoT (IIoT). Attacks against RPL have shown to be possible, as the attackers utilize the unauthorized parent selection system of the RLP protocol. In this work, we are proposing a methodology and architecture to detect intrusions against IIoT. Especially, we are targeting to detect attacks against RPL by using genetic programming. Our results indicate that the developed framework can successfully (with high accuracy, along with high true positive and low false positive rates) detect routing attacks in RPL-based Industrial IoT networks.

  • 5.
    Beije, Gustav
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pix2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis is about the creation of a new game framework named Pix and a comparison between it and the game engine Godot. The purpose is to create a game framework that focuses on making the workflow streamlined for the pro- grammer and at the same time giving the programmer a lot of creative power. Pix uses C# as programming language which runs on the .NET Core platform. Pix is built with Entity Component System (ECS) design which means that the design is data-oriented and that it focuses on composition. Thus the ECS design brings with it a clear separation between logic and data. The ECS design also makes it easy to write multithreaded code and to serialize the game world state. The comparison against Godot shows clear differences between how you use them and the philosophy about how the users become familiar with them. The obvious difference between them is that the main time spent working with Godot will be in the graphical user interface. In Pix on the other hand you will only work in a text-editor or an IDE if you do not create your own editor. The coding in Godot is done primarily with the script language GDScript. It is made for creating common game functionality but can’t be used to extend the engine with new advanced functionality. Thus to integrate new more advanced features Godot will need to be recompiled. Being forced to recompile the engine to add new advanced features results in that extending the engine can both be time consuming and challenging. In Pix there is no difference between coding game functionality and extending the framework. This equality in Pix between coding game functionality and extending the framework brings with it that when you can make a game in Pix you can also extend the engine with more functionality. The differences results in that Godot is simpler to learn but also gives the regu- lar user less power. Pix is the opposite of that. I you look at the workflow of us- ing Pix and combine that with the technologies Pix is built upon you can see that Pix differentiates itself from the already existing alternatives. The work- flow Pix provides and the technologies it is built upon shows that Pix can be a good alternative for creating complex games that doesn't need the most ad- vanced graphical features.

  • 6.
    Blank, Fredrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Handlingsplaner och diskussion: Samarbetsverktyg2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This report discloses the implementation of a collaboration tool in the form of action plans and discussion functionality in behalf of the company ZonderaCom AB (Zondera). The current tool used for this purpose is inflexible, have a hard time meeting customer requirements and therefore needs to be replaced. The new application is part of a larger entity where user management and database schemas are already in place. The functionality of this application consists of issue management, chat/discussion, document management, notes, sharing and printing. For users with higher permissions a summary view will also be available. The application is implemented using ASP.NET Core MVC, Entity Framework (EF) and SQL Server as the database engine. A SPA-based approach is used where the UI (User Interface) is dynamically rendered and loaded via Ajax and partial views. The source code for the application is largely omitted from this report due to business reasons. Interface’s and database schemas are used to display code and database structure.

  • 7.
    Bonafini, Federico
    et al.
    University of Brescia, Italy.
    Depari, Alessandro
    Univeristy of Brescia, Italy.
    Ferrari, Paolo
    University of Brescia, Italy.
    Flammini, Alessandra
    University of Brescia, Italy.
    Pasetti, Marco
    University of Brescia, Italy.
    Rinaldo, Stefano
    University of Brescia, Italy.
    Sisinni, Emiliano
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. University of Brescia, Italy.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Exploiting localization systems for LoRaWAN transmission scheduling in industrial applications2019In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, article id 8757999Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) paradigm contaminated industrial world, allowing for innovative services. The wireless communications seem to be particularly attracting, especially when complement indoor and outdoor Real Time Location Systems (RTLS) for geo-referencing smart objects (e.g. for asset tracking). In this paper, the LoRaWAN solution is considered for transmitting RTLS data. LoRaWAN is an example of Low Power Wide Area Network: it tradeoffs throughput with coverage and power consumption. However, performance can be greatly improved with limited changes to the standard specifications. In this work, a scheduling layer is suggested above the regular stack for allocating communication resources in a time slot channel hopping medium access strategy. The main innovation is the time synchronization, which is obtained opportunistically from the ranging devices belonging to the RTLSs. The experimental testbed, based on commercially available solutions, demonstrates the affordability and feasibility of the proposed approach. When low-cost GPS (outdoor) and UWB (indoor) ranging devices are considered, synchronization error of few microseconds can be easily obtained. The experimental results show the that time reference pulses disciplined by GPS have a maximum jitter of 180 ns and a standard deviation of 40 ns whereas, if time reference pulses disciplined by UWB are considered, the maximum jitter is 3.3 μs and the standard deviation is 0.7 μs.

  • 8.
    Bosse, Sebastian
    et al.
    Fraunhofer Institute for Telecommunications – Heinrich Hertz Institute, Berlin, Germany.
    Brunnström, Kjell
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. Research Intstitutes of Sweden AB.
    Arndt, Sebastian
    Norwegian University of Science and Technology, Trondheim, Norway.
    Martini, Maria G.
    Kingston University, London, UK.
    Ramzan, Naeem
    University of the West of Scotland, Hamilton, UK.
    Engelke, Ulrich
    CSIRO Data61, Kensington, Australia.
    A common framework for the evaluation of psychophysiological visual quality assessment2019In: Quality and User Experience, ISSN 2366-0139, E-ISSN 2366-0147, Vol. 4, no 3Article in journal (Refereed)
    Abstract [en]

    The assessment of perceived quality based on psychophysiological methods recently gained attraction as it potentially overcomes certain flaws of psychophysical approaches. Although studies report promising results, it is not possible to arrive at decisive and comparable conclusions that recommend the use of one or another method for a specific application or research question. The video quality expert group started a project on psychophysiological quality assessment to study these novel approaches and to develop a test plan that enables more systematic research. This test plan comprises of a specifically designed set of quality annotated video sequences, suggestions for psychophysiological methods to be studied in quality assessment, and recommendations for the documentation and publications of test results. The test plan is presented in this article.

  • 9.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Location Privacy Assured Internet of Things2019In: Proceedings of the 5th International Conference on Information Systems Security and Privacy / [ed] Paolo Mori, Steven Furnell and Olivier Camp, Setúbal, Portugal: SciTePress, 2019, Vol. 1, p. 623-630Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) is in the booming age of its growth, therefore a vast amount of applications, projects, hardware/software solutions, and customized concepts are being developed. The proliferation of IoT will enable location-based services to be available everywhere for everyone, and this will raise a large number of privacy issues related to the collection, usage, retention, and disclosure of the user’s location information. In order to provide a solution to this unique problem of IoT, this paper proposes Location Privacy Assured Internet of Things (LPA-IoT) scheme, which uses the concepts of Mix-Zone, location-obfuscation along with context-awareness. To the authors’ best knowledge, the proposed LPA-IoT scheme is the first location-based privacy-preserving scheme for IoT that provides flexible privacy levels associated with the present context of the user.

  • 10.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    School of Engineering (DEI/ISEP), Polytechnic of Porto (IPP), 4200-072 Porto, Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Security Risk Analysis of LoRaWAN and Future Directions2019In: Future Internet, ISSN 1999-5903, E-ISSN 1999-5903, Vol. 11, no 1, article id 3Article in journal (Refereed)
    Abstract [en]

    LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysisof the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors’ knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.

  • 11.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sari, Alparslan
    Department of Computer Engineering, University of Delaware, Newark, Delaware, USA.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Security Implications of Fog Computing on the Internet of Things2019In: International Conference on Consumer Electronics (ICCE), IEEE, 2019, article id 8661909Conference paper (Refereed)
    Abstract [en]

    Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.

  • 12.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions2019In: Secure Cyber-Physical Systems for Smart Cities / [ed] Riaz Ahmed Shaikh, Hershey, USA: IGI Global, 2019, p. 74-102Chapter in book (Refereed)
    Abstract [en]

    Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.

  • 13.
    Bygdeson, Mattias
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Utvecklingen av Spotalike2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The goal with this assignment has been to study the product Spotalike and develop a new version to make the product more attractive. The studying of the product was done with the help of user data, such as how Spotalike is being used, what target audience it has, why it's being used, etc. The new version of Spotalike was planned by making design sketches and prototypes which were created as a first step in order to get a better picture of what the result would be. The new version is not available to the public, but it is fully functional and works locally. The solution that was concluded was to develop a music player which is built on the founding principles of the old Spotalike. The music player is developed with React and is powered by Spotify. Besides the old functions there are also new functions that has been implemented, and the interface has been redesigned. There is currently no new user data available to determine the result of the development, since the new version of Spotalike hasn't been made public yet.

  • 14.
    Bylin, Jenniefer
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Riskanalys av självkörande fordon i hamnområden: En kvalitativ studie för interna transporter av containrar2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, companies face constant challenges, as the business must constantly be developed in order to compete. As new ports are being built in already existing ones, other opportunities are often made available to develop further and reduce costs and risks. Replacing some labour against automation is one of them. The study aims to ensure the risks of using selfdriving vehicles for the movement of containers in port areas. The work has been carried out at SCA in Tunadal for their new coming terminal. The aim of the study was to examine the risk associated with manpower versus self-driving vehicles exist. If, based on a safety aspect, it is profitable to go towards a more automated business. To carry out the study, documents have been collected describing the accidents in the port, two persons who are extra responsible for the accidents in the port have been interviewed and observations have been made to also see how the self-driving vehicle is to be applied to reality. When processing the data, THERP - Technique for human error rate prediction has been used for mapping the current situation. FMEA - failure mode and effects analysis and FTA - Fault tree analysis has been used to map the future situation with automation. The result shows that from a safety perspective, it is safest to use self-driving vehicles, as it is the human slips that represent the greatest risks in port areas.

  • 15.
    Carlsson, August
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Åqvist, Marcus
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lean´s påverkan på arbetsmiljön: En kvalitativ studie över effekterna på arbetsmiljö och hälsa vid införande av Lean2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    There are many organizations that choose to introduce Lean production in their operations, as these are the concepts that have made the greatest progress in terms of efficiency programs. Since Lean focuses on maximizing customer benefit and minimizing waste of resources in an organisation's business processes, it is often forgotten that the introduction also affects the staff. The purpose of the study is to investigate what effects on the working environment and health that employees in the private sector experience after an introduction of Lean production as a strategy within their organization. The aim of the study has been to answer how a Lean introduction affects the working environment and health. The study is based on Almondy's latest improvement work on the shrinkage process. With the help of an interview study and a general literature study, we have examined what effects a Lean introduction has on the work environment and health. The interview study was conducted at Almondy AB, which is a food producer based in Gothenburg. Searching the literature is done in article databases with keywords linked to the area. By means of a comparative analysis method, the result has been analyzed. There are studies that show that the effects vary depending on the point of view they have had and in which industry the survey was conducted. This means that the effects get a large spread and therefore it is difficult to give a general picture of the effects. The results of the interview study show a positive effect on the work environment as they describe that the physical moments in the process have decreased. The results of the literature study show that more studies are needed to be able to demonstrate the general effects that Lean has on the working environment. But the literature study suggests that there are both negative and positive effects on the work environment and health when introducing Lean. The conclusion suggests that Almondy has had a positive impact on their physical work environment since there has been a decrease in deviation reports. If someone wants to study further in the field, Lean production should be investigated in several industries and examine all aspects of a Lean introduction linked work environment and health.

     

  • 16.
    Davidsson, Viola
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Att välja e-arkiv2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digitization has exploded over the past 30 years and unfortunately the archives have not been able to do so. Many municipalities have not yet taken the step out and introduced e-archives, from a survey conducted by the National Archives in 2010, it turned out that only one-fifth of Sweden's municipalities had introduced e-archives, which is very little considering how much progress digitalization has made.

    There are two purposes for this thesis; The first is to do a small survey to capture reasons why some municipalities have introduced e-archives and others not. The other is to show what requirements there are on e-archives regarding legal aspects, security, user-friendliness and what cost the introduction of e-archives entails. The thesis is aimed at municipalities with about 10,000-30,000 inhabitants, where there are no equal opportunities for finance and competence that a larger municipality has.

    The issues are:

    What are the requirements for e-archives regarding legal aspects, security, user-friendliness and can the municipalities bear the cost of e-archives?

    Why did some municipalities get started with e-archives and others not?

    Method for this is a combination of literature study and interview study. Interviews have been done with two suppliers of e-archives, who want to be anonymous in this paper and 4 municipalities, of which two have introduced e-archives and two do not have e-archives. These municipalities have chosen because they are municipalities with about 10 000-30 000 inhabitants (to whom the report is directed). They were also chosen because they are close to each other purely geographical and can thus give a fair picture of the result.

    All the questions were answered in the result section.

    Requirements for legal aspects are the Freedom of the Press Decree. 2, which states that all Swedish citizens have the right to access public documents. The Archives Act regulates what is required for archives, what the purpose is, what it is supposed to do, and that the authorities are to care for their archives.

    In terms of cost, there was the ambition to get an economic picture of what e-archives cost. One municipality submitted price information and the other municipality referred to SKL kommentus which has confidentiality on the price information. The suppliers also did not issue price information and because of this, a comparison could not be made. However, there are some tips on how to think about procurement instead.

    Regarding security, there are examples of what one can think of, such as authorization control in the e-archive to protect the archive from unauthorized persons.

    With regard to accessibility, this essay has chosen to mean how accessible the e-archive is to the public and also the disabled. Therefore, Ales e-archive has been reviewed and the single Post and Telecom Agency's - Guidance for web development has Ale municipality reached 44 %, so they have a bit left.

    In response to the second question, it emerged after the interview study that the biggest reason why the municipalities did not get started with e-archives is that they lack competence and thus a fiery person who drives the issue and resources.

  • 17.
    Dima, Elijs
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Brunnström, Kjell
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. RISE Research Institutes of Sweden, Division ICT - Acreo.
    Sjöström, Mårten
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Andersson, Mattias
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Edlund, Joakim
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Johanson, Mathias
    Alkit Communications AB.
    Qureshi, Tahir
    HIAB AB.
    View Position Impact on QoE in an Immersive Telepresence System for Remote Operation2019In: 2019 Eleventh International Conference on Quality of Multimedia Experience (QoMEX), IEEE, 2019, p. 1-3Conference paper (Refereed)
    Abstract [en]

    In this paper, we investigate how different viewing positions affect a user's Quality of Experience (QoE) and performance in an immersive telepresence system. A QoE experiment has been conducted with 27 participants to assess the general subjective experience and the performance of remotely operating a toy excavator. Two view positions have been tested, an overhead and a ground-level view, respectively, which encourage reliance on stereoscopic depth cues to different extents for accurate operation. Results demonstrate a significant difference between ground and overhead views: the ground view increased the perceived difficulty of the task, whereas the overhead view increased the perceived accomplishment as well as the objective performance of the task. The perceived helpfulness of the overhead view was also significant according to the participants.

  • 18.
    Eldefrawy, Mohamed
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Butun, Ismail
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    Polytechnic of Porto (IPP), Porto, Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Formal security analysis of LoRaWAN2019In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 148, p. 328-339Article in journal (Refereed)
    Abstract [en]

    Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.

  • 19.
    Eldefrawy, Mohamed
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. Halmstad Högskola.
    Ferrari, Nico
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Dynamic User Authentication Protocol for Industrial IoT without Timestamping2019In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, article id 8757984Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.

  • 20.
    Eldefrawy, Mohamed
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    The Polytechnic of Porto (IPP), Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates2019In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 1, p. 906-917Article in journal (Refereed)
    Abstract [en]

    The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements such as increasing production flexibility, self-organization and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast re-keying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the Gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-the-art key-exchange protocols, to show our protocol reliability for IIoT.

  • 21.
    Engvall, Tove
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Records roles in Corporate Sustainability Reporting: An explorative study of corporate sustainability reporting from an archives and information science perspective2019Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Calls for more responsible companies, have led to initiatives and legislations of sustainability reporting, in order to improve corporate transparency and accountability regarding companies economic, environmental and social impact.

    The aim of the research was to explore records roles in corporate sustainability reporting, which is discussed from an archives and information science perspective. Records are regarded as evidence of business activities and therefore crucial to accountability and decision-making processes. A sustainability report is a record, and records are also used to create a sustainability report.

    The thesis is based on a qualitative explorative methodology with interviews as data gathering technique. Interviews were carried out with four employees at three different companies who work with sustainability reporting, a sustainability consultant who works with sustainability reporting, and an auditor who assesses the  companies´ annual and sustainability reports. The interviews have addressed records’ role in different aspects of sustainability reporting, exploring how sustainability reports are created, used and pluralized. As well as how the records, generated as an effect of the reporting process, are used, what impact they have on the business and efficiency of the process. The thesis also explore respondents´ perspectives on reliability and credibility of the reports in relation to records qualities. Results from the interviews have been analysed with the lens of Records Continuum Model and the ISO standard for records management, ISO 15489-1:2016.

    Results show that records are key assets that provide evidential information that enables different functions and benefits –both to companies that report and to stakeholders. Primary benefits of the reporting that have been emphasized are that it enables transparency and accountability, informed decision-making, management of risks, compliance with legislation, ability to demonstrate corporate responsibility and meeting sustainability goals, greater business efficiency, evidence-based analysis and development activities, formation of business culture and identity, and protection of corporate and collective memory about the corporates’ work regarding sustainability. Records are also valuable assets for governance and continuous improvements. It enables to monitor trends and assessment on how the company meets its targets.

    The thesis gives an increased understanding of records’ role in a socio-economic context. It also suggests some areas for further research and development in order for sustainability reporting to further support a sustainable development. One of the major tasks would be to make pluralization of sustainability-related records more efficient, in order to facilitate further utilization of the information. This may enhance corporate accountability and decision making based on sustainability criteria, and would make the work more efficient for companies. The global records governance environment can be improved further, in order to support  global sustainable development. Important is also to raise awareness about the role of trustworthy records.

  • 22.
    Engvall, Tove
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Situating trust challenges of online trade2019In: Records Management Journal, ISSN 0956-5698, E-ISSN 1758-7689, Vol. 29, no 1-2, p. 272-286Article in journal (Refereed)
    Abstract [en]

    Purpose: This paper aims to offer an improved understanding of trust challenges in online trade, providing examples of issues that should be addressed for a trustworthy online environment. It also aims to illustrate how records and recordkeeping can contribute in terms of enabling trust and accountability. Design/methodology/approach: The paper is based on results from a self-ethnographic study of online trade (Engvall, 2017); the results are analyzed further. Kelton, Fleischmann and Wallace’s (2008) model for trust is used to gain a better understanding of the characteristics of the challenges and where they should be addressed. Findings: This paper recognizes that there are different types of trust challenges at different levels – individual, between clients and businesses and at a societal level – that should be addressed at these levels in different ways. Originality/value: This paper provides an understanding of trust challenges in the online environment. 

  • 23.
    Engvall, Tove
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Anderson, Karen
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Bunn, Jenny
    University College London.
    Flinn, Andrew
    University College London.
    Michetti, Giovanni
    Sapienza University of Rome.
    Gänser, Georg
    InterPARES Trust.
    Cai, Yingfang
    The State Archives Administration of China.
    Henttonen, Pekka
    University of Tempere.
    The role of the records professional2019In: Trusting Records in the Cloud / [ed] Luciana Duranti & Corinne Rogers, London: Facet Publishing, 2019, 1, p. 223-244Chapter in book (Refereed)
    Abstract [en]

    With digitalization, professional roles changes. New tasks, skills and collaboration with other professions are needed. This chapter highlight core responsibilities and expertise that records professionals contribute. It also highlight examples from initiatives with open data in Sweden and United Kingdom, as well as development of digitization of accounting in China. 

  • 24.
    Engvall, Tove
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Samuelsson, Göran
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Ekonomiskt värde av information2017Report (Other academic)
    Abstract [sv]

    Information är en av Trafikverkets resurser och dess värde kan uttryckas på olika sätt och ha olika innebörd för olika aktörer vid olika tidpunkter. Informationen kan ha direkta ekonomiska värden, men värdet kan också uttryckas i dess betydelse för en långsiktig resursplanering och ekonomihantering.  Informationen  kan även bidra till arbetssätt som hushållar med skattemedel, och skapa  samhällseffekter inom t.ex  säkerhet och miljö. Vi har i den befintliga studien bland annat utgått ifrån standarden ISO 30300 som menar: 

    ”Att skapa och hantera verksamhetsinformation ingår i varje organisations aktiviteter, processer och system. Detta bidrar till effektivitet i verksamheten, ansvarstagande och riskhantering och till att verksamheten upprätthålls. Det gör det även möjligt för organisationer att se det värde som finns i informationsresurser som verksamhetstillgångar, kommersiella tillgångar och kunskapstillgångar, och bidra till att bevara det kollektiva minnet, som svar på utmaningar från den globala och digitala omvärlden” (ISO 30300, sid. iv). 

    I denna studie har vi valt att undersöka hur informationshanteringen, med fokus på ekonomirelaterad information, stödjer det pågående arbetet med ett livscykelperspektiv på anläggningen. Bakgrunden är Trafikverkets ambitioner att skapa en helhetssyn över anläggningens kostnader genom hela livscykeln. Och därmed också hur den ekonomiska redovisningen relaterar till annan information. Studien baseras på intervjuer med i huvudsak medarbetare på Trafikverket, men även vissa andra nyckelpersoner. Personer från följande funktioner och arbetsfält har intervjuats:  CoClass, BIM, ANDA/GUS, Öppna data, Informationsutbyten, Informationsförvaltning, Ekonomi, Ledningssystem, IT-strategi, Kontrakt och juridik, LCC, Internrevision, Riksrevisionen, Transportstyrelsen och Näringsdepartementet.

  • 25.
    Eriksson, John
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Karlsson, Tobias
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Visualiseringsverktyg för migrerad kod: Ersättare till Guardien2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Java is one of the most widely used programming languages used today. CSN that previously used 4 GL tool should now migrate to Java development, which means that there is a need for a tool to show dependencies and relationships in the migrated and newly developed Java code. The GuardIEn was previously used in the old code base, but that tool will be wound up after CSN's after migration to Java. The overall purpose of the project is to create a graph database with data that is scanned with the tool jqAssistant. This database is then used by a Java backend that retrieves relationships and nodes from the graph database which is then used with a separate web interface in Angular to visualize all relations between program code

  • 26.
    Falenius, Erik
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Jarl, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lean – En utveckling från produktion till välfärd och service: En litteraturstudie av hur Lean utvecklats från produktion till välfärds- och servicebranschen2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study consists of two studies around Lean. The studies are limited to two databases and three different sectors, the industry sector where Lean originated from, and the welfare and service sectors.

    The first study is a quantitative pilot study on published articles. The purpose was to get an understanding of what extent the different sectors get published, compared to each other. The result was illustrated in a graph where 40 articles per year were proportionally divided between the three sectors.

    The main study is a literature review where a scoring matrix was used to cull the selected articles. The remaining articles where compared to the “Toyota house” to answer the research questions:

    In what way has the definition of Lean changed from the manufacturing-based improvement philosophy it originated as, to the concept that is used in different sectors today?

    How does the specific sector affect the implementation of Lean, is there a difference in the Lean that is described in the literature compared to the Lean that is used in the welfare or service sectors?

    The study found in the chosen literature is that the sectors that are new at using Lean are using less of the tools available and in a smaller part of the organization, instead of using it on the whole organization. Many case studies where found that describes what tool was used, but not how they were used. One sector with many published articles was the construction sector, but they were overlooked due to the limitations of the study.

  • 27.
    Farag, Hossam
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Enabling Time- and Mission-Critical Applications in Industrial Wireless Sensor Networks2019Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Nowadays, Wireless Sensor Networks (WSNs) have gained importance as aflexible, easier deployment/maintenance and cost-effective alternative to wired networks,e.g., Fieldbus and Wired-HART, in a wide-range of applications. Initially,WSNs were mostly designed for military and environmental monitoringapplications where energy efficiency is the main design goal. The nodes in the network were expected to have a long lifetime with minimum maintenance while providing best-effort data delivery which is acceptable in such scenarios. With recent advances in the industrial domain, WSNs have been subsequently extended to support industrial automation applications such as process automation and control scenarios. However, these emerging applications are characterized by stringent requirements regarding reliability and real-time communications that impose challenges in the design of Industrial Wireless Sensor Networks (IWSNs) to effectively support time- and mission-critical applications.

    Typically, time- and mission-critical applications support different traffic categories ranging from relaxed requirements, such as monitoring traffic to firm requirements, such as critical safety and emergency traffic. The critical traffic is mostly acyclic in nature and occasionally occurs at unpredictable time instants. Once it is generated, it must be delivered within strict deadlines. Exceeding the delay bound could lead to system instability, economic loss, or even endanger human life in the working area. The situation becomes even more challenging when an emergency event triggers multiple sensor nodes to transmit critical traffic to the controller simultaneously. The unpredictability of the arrival of such a type of traffic introduces difficulties with regard to making a suitable scheduling that guarantees data delivery within deadline bounds. Existing industrial standards and related research work have thus far not presented a satisfactory solution to the issue. Therefore, providing deterministic and timely delivery for critical traffic and its prioritization over regular traffic is a vital research topic.

    Motivated by the aforementioned challenges, this work aims to enable real-timecommunication for time- and mission-critical applications in IWSNs. In this context, improved Medium Access Control (MAC) protocols are proposed to enablea priority-based channel access that provides a timely delivery for acyclic critical traffic. The proposed framework starts with a stochastic modelling of the network delay performance under a priority-oriented transmission scheme, followed by two MAC approaches. The first approach proposes a random Clear Channel Assessment (CCA) mechanism to improve the transmission efficiency of acyclic control traffic that is generated occasionally as a result of observations of an established tendency, such as closed-loop supervisory traffic. A Discrete-Time Markov Chain (DTMC) model is provided to evaluate the performance of the proposed protocol analytically in terms of the expected delay and throughput. Numerical results show that the proposed random CCA mechanism improves the shared slots approach in WirelessHART in terms of delay and throughput along with better transmission reliability.

    The second approach introduces a slot-stealing MAC protocol based on a dynamic deadline-aware scheduling to provide deterministic channel access in emergency and event-based situations, where multiple sensor nodes are triggered simultaneously to transmit time-critical data to the controller. The proposed protocol is evaluated mathematically to provide the worst-case delay bound for the time-critical traffic and the numerical results show that the proposed approach outperforms TDMA-based WSNs in terms of delay and channel utilization.

  • 28.
    Farag, Hossam
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    DeP-D: A Decentralized Primal-Dual Optimization Algorithm for Industrial Wireless Sensor Networks2019In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, article id 8757934Conference paper (Refereed)
    Abstract [en]

    Industrial Wireless Sensor Networks (IWSNs) are emerged as flexible and cost-efficient alternatives to the traditional wired networks in various monitoring and control applications within the industrial domain. Low delay is a key feature of delay-sensitive applications as the data is typically valid for a short interval of time. If data arrives too late it is of limited use which may lead to performance drops or even system outages which can create significant economical losses. In this paper, we propose a decentralized optimization algorithm to minimize the End-to-End (E2E) delay of multi-hop IWSNs. Firstly, we formulate the optimization problem by considering the objective function as the network delay where the constraint is the stability criteria based on the total arrival rate and the total service rate. The objective function is proved to be strictly convex for the entire network, then a Decentralized Primal-Dual (DeP-D) algorithm is proposed based on the sub-gradient method to solve the formulated optimization problem. The performance of the proposed DeP-D is evaluated through simulations and compared with WirelessHART network and the results show that the proposed DeP-D can achieve at least 40% reduction in the average E2E delay.

  • 29.
    Farag, Hossam
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sisinni, Emiliano
    Brescia University, Brescia, Italy.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks2019In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 19, no 7, p. 2767-2780Article in journal (Refereed)
    Abstract [en]

    Industrial wireless sensor networks are becoming popular for critical monitoring and control applications in industrial automation systems. For such type of applications, providing reliable real-time performance regarding data delivery is considered as a fundamental challenge. The problem becomes more prominent with mixed-criticality systems, where different data flow with different levels of criticality (importance) coexist and characterized by different requirements regarding delay and reliability. In this paper, we propose a wireless fieldbus protocol to enable real-time communication and service differentiation for cluster-based mixed-criticality networks. A process monitoring scenario of plastic extrusion is used to define the protocol requirements and elaborate the working principle of the proposed work. In our proposed protocol, each data flow is scheduled for channel access based on its criticality level using a distributed prioritized medium access mechanism that ensures a guaranteed channel access for the most critical traffic over other traffic types. The performance of the proposed protocol is analyzed analytically using a discrete-time Markov chain model to evaluate the performance in terms of delay and throughput. Moreover, the extensive simulations are conducted to prove the analytical claims and different performance assessments are provided, which also demonstrate the effectiveness of the proposed approach compared with the related existing work.

  • 30.
    Forsström, Stefan
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Jennehag, Ulf
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous Agents2019In: COINS '19 Proceedings of the International Conference on Omni-Layer Intelligent Systems, ACM Digital Library, 2019, Vol. F148162, p. 116-121Conference paper (Refereed)
    Abstract [en]

    This article presents a system for creating an implemented open energy market for future smart grid systems, microgrids, the Internet of Things, and the Industrial Internet of Things. We also investigate and analyze different aspects of blockchain technologies for this purpose in order to choose the appropriate methods, technologies, and approaches for realizing and implementing the system as an open source project. Based on this analysis, we present our resulting functional implementation of this energy market. Including measurements and a quantitative evaluation of the implementation itself. Showing the potential of the approach, where this implantation can be applied, showing its drawbacks, and finally our planned future work.

  • 31.
    Fredin, Elias
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    GNSS undersökning: För bättre precision i smartphones2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    To be able to receive a position from a smartphone user is very valuable. Wit- hout this many applications would not work at all. For many applications the existing position libraries are not good enough, for example augmented reality applications which requires millimeter precision for a good experience. The goal of this report is to study if GNSS positioning can be improved for smartphones.The study focuses mostly on Android and has the goal of using the method “trilateration” to combine multiple satellites position and their distance to a receiver in order to calculate a real position. The projekt consists of two parts: and Android application and a Java Tomcat server. The android applica- tion uses the programming library “Location” to access raw GNSS-data for cal- culating the distance between the receiver and the satellites, which is called “pseudorange”, and the server functions as a REST API which provides GALI- LEO satellites current position. The project tries to combine these parameters in the Application to create a position. Although the report did not succeed in com- bining these parameters to calculate a position, it does describe of it is still pos- sible; which applications has succeeded before and what others ought to think about when starting similar studies. This project would require a bit more time to reach its end goal, but the fact that raw GNSS-data has become available to all developers on Android is a promising development since others may conti- nue or do their own research. This project focuses solely on GALILEO satelli- tes, mostly to time constraints. In future works all available satellite constella- tions should be used for better results.

  • 32.
    Försth, Sebastian
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    When your finger isn't enough: New ways to increase the accessibility of mobile phones2019Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The objective of this study has been to answer three questions. The questions are Can you navigate in a different way than with your fingers, Do you lose any functionality in the application when you are not using your fingers and is the solution a reasonable way to navigate. The study consist of two parts, the first is to create a navigation library with different navigation methods and the second part is to evaluate the navigation methods using user tests. The study shows that it is possible to navigate without the use of fingers and address problems and solution to navigate without the use of fingers. The study shows how different navigation methods perform compared to each other and compared to navigating with the use of fingers.

  • 33.
    Gardner, Angelica
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Improving the Chatbot Experience: With a Content-based Recommender System2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Chatbots are computer programs with the capability to lead a conversation with a human user. When a chatbot is unable to match a user’s utterance to any predefined answer, it will use a fallback intent; a generic response that does not contribute to the conversation in any meaningful way. This report aims to investigate if a content-based recommender system could provide support to a chatbot agent in case of these fallback experiences. Content-based recommender systems use content to filter, prioritize and deliver relevant information to users. Their purpose is to search through a large amount of content and predict recommendations based on user requirements. The recommender system developed in this project consists of four components: a web spider, a Bag-of-words model, a graph database, and the GraphQL API. The anticipation was to capture web page articles and rank them with a numeric scoring to figure out which articles that make for the best recommendation concerning given subjects. The chatbot agent could then use these recommended articles to provide the user with value and help instead of a generic response. After the evaluation, it was found that the recommender system in principle fulfilled all requirements, but that the scoring algorithm used could achieve significant improvements in its recommendations if a more advanced algorithm would be implemented. The scoring algorithm used in this project is based on word count, which lacks taking the context of the dialogue between the user and the agent into consideration, among other things.

  • 34.
    Gebremichael, Teklay
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lightweight Cryptographic Group Key Management Protocols for the Internet of Things2019Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques.

    A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group.

    This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group.

    The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process.

    To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.

  • 35.
    Gebremichael, Teklay
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Jennehag, Ulf
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lightweight IoT Group Key Establishment Scheme from the One Time PadManuscript (preprint) (Other academic)
    Abstract [en]

    Secure group communication in the Internet ofThings (IoT) entails the establishment and management of oneor more group keys to provide group security services such asconfidentiality of group messages. The main challenges in estab-lishing a group key consist in designing a group key establishmentscheme that is feasible for nodes with limited computationalcapabilities. In this paper, we propose a lightweight group keyestablishment scheme based on fast symmetric-key encryption.We show a mechanism for designing a lightweight and secure IoTgroup key establishment and management scheme whose securityis underpinned by the perfect secrecy provided by the One-time-pad. We then argue that the scheme is convenient for IoT groupapplications where nodes are resource-constrained. We prove thatour scheme is secure under a threat model where the attackerhas sufficiently large computational power. We also prove thatthe scheme provides desired group security properties such asconfidentiality, key secrecy and independent group session keysgeneration.

  • 36.
    Ghafoor, Mubeen
    et al.
    COMSATS Inst Informat Technol, Islamabad, Pakistan.
    Tariq, Syed Ali
    COMSATS Inst Informat Technol, Islamabad, Pakistan.
    Abu Bakr, M.
    COMSATS Inst Informat Technol, Islamabad, Pakistan.
    Jibran,
    COMSATS Inst Informat Technol, Islamabad, Pakistan.
    Ahmad, Waqas
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Zia, Tehseen
    COMSATS Inst Informat Technol, Islamabad, Pakistan.
    Perceptually Lossless Surgical Telementoring System Based on Non-Parametric Segmentation2019In: Journal of Medical Imaging and Health Informatics, ISSN 2156-7018, E-ISSN 2156-7026, Vol. 9, no 3, p. 464-473Article in journal (Refereed)
    Abstract [en]

    Bandwidth constraint is one of the significant concerns of surgical telementoring, especially in rural areas. High-Efficiency Video Coding (H.265/HEVC) based video compression techniques have shown promising results for telementoring applications. However, there is a tradeoff between the quality of video received by the remote surgeon and the bandwidth resources required for video transmission. In order to efficiently compress and transmit real-time surgical videos, a hybrid lossless-lossy approach is proposed where surgical incision region (location of surgery) is coded in high quality while the background (non-incision) region is coded in medium to low quality depending on the nature of the region. The surgical incision region is detected based on an efficient color and location-based non-parametric segmentation approach. This approach takes explicitly into account the physiological nature of the human visual system and efficiently encodes the video by providing good overall visual impact in the location of surgery. The results of the proposed approach are shown in terms of video quality metrics such as Bjontegaard delta bitrate (BD-BR), Bjontegaard delta peak signal-to-noise ratio (BD-PSNR), and structural similarity index measurement (SSIM). Experimental results showed that in comparison with default full-frame HEVC encoding, the proposed surgical incision region based encoding achieved an average BD-BR reduction of 77.5% at high-quality settings (QP in range of 0 to 20 in surgical incision region and an increasing QP in skin and background region). The average gain in BD-PSNR of the proposed algorithm was 6.99 dB in surgical incision region at high-quality setting, and the average SSIM index came out to be 0.9926 which is only 0.006% less than the default full-frame HEVC coding. Based on these results, the proposed encoding algorithm can be considered as an efficient and effective solution for surgical telementoring systems for limited bandwidth networks.

  • 37.
    God, Jon
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Investerare & start-ups med fokus på hållbar utveckling: Discrete Choice Experiments för att undersöka investerares benägenhet att investera i hållbar utveckling2019Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    A sustainable development becomes more and more important with an increasing number of catastrophic and long-term changes to the environment due to global warming. This also means that all the actors in the society needs to take their responsibility to combat this development. One of these actors are the private sector where the investors plays a large part in which companies that gets to develop their ideas and make a difference in the world. So, the question is: are investors taking that responsibility today and invest in start-ups with a focus on sustainable development in their business plans. This thesis aims to study how inclined investors are to invest in start-ups with a focus on sustainable development in their business plan. This is tested though Discrete Choice Experiments where 14 investors got to choose between three different companies with different levels of focus on sustainable development. Company A with the least amount of sustainability, company B with some focus and company C with a high focus on sustainable development. The Discrete Choice Experiments were distributed through a survey format where the companies were represented with a Business Model Canvas each and the investors first got to choose between company A & B, then A & C, and then company B & C. The results show that investors chose company A with the least amount of focus on sustainable development in 26 percent of the cases, company B with some focus in 45 percent, and company C with a high amount of focus in 29 percent of the cases. The study also shows a variation between different groups of investors, i.e. the investors who identified themselves as women were more inclined on investing in more sustainable options then men, and angel investors showed a clear willingness to invest in sustainability compared to venture capitals. The conclusions of the study are that its purpose was fulfilled and that the research questions was answered, investors showed an inclination to investing in companies with some focus on sustainable development but not too much. The results of the study can be used by companies in need of investments since they can see what group they should focus on to increase their chances. It is despite this also important to remember that the reliability and the validity of the study can be criticised with flaws for example in the reputability of the results. Future research within the area should study larger populations of investors to see if the same patterns repeat itself in other groups. It should also split the different attributes of the business model to see if different attributes play a larger part when investors decide which company to invest in.

  • 38.
    Grimaldi, Simone
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Real-time Interference Identification via Supervised Learning: Embedding Coexistence Awareness in IoT Devices2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 835-850Article in journal (Refereed)
    Abstract [en]

    Energy sampling-based interference detection and identification (IDI) methods collide with the limitations of commercial off-the-shelf (COTS) IoT hardware. Moreover, long sensing times, complexity and inability to track concurrent interference strongly inhibit their applicability in most IoT deployments. Motivated by the increasing need for on-device IDI for wireless coexistence, we develop a lightweight and efficient method targeting interference identification already at the level of single interference bursts. Our method exploits real-time extraction of envelope and model-aided spectral features, specifically designed considering the physical properties of signals captured with COTS hardware. We adopt manifold supervised-learning (SL) classifiers ensuring suitable performance and complexity trade-off for IoT platforms with different computational capabilities. The proposed IDI method is capable of real-time identification of IEEE 802.11b/g/n, 802.15.4, 802.15.1 and Bluetooth Low Energy wireless standards, enabling isolation and extraction of standard-specific traffic statistics even in the case of heavy concurrent interference. We perform an experimental study in real environments with heterogeneous interference scenarios, showing 90%–97% burst identification accuracy. Meanwhile, the lightweight SL methods, running online on wireless sensor networks-COTS hardware, ensure sub-ms identification time and limited performance gap from machine-learning approaches.

  • 39.
    Große, Christine
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sources of Uncertainty in Swedish Emergency-Response Planning2019In: Journal of Risk Research, ISSN 1366-9877, E-ISSN 1466-4461, Vol. 22, no 6, p. 758-772Article in journal (Refereed)
    Abstract [en]

    With the growing importance of enhancing modern society’s resilience, planning for critical infrastructure protection has become essential. However, such national planning must contend with many types of uncertainty. This paper characterises sources of uncertainty that are associated with a lack of knowledge, as exemplified by Swedish planning of emergency power supplies. The planning under investigation concerns civil protection from the negative effects of a power shortage. A decision process is intended to support this national strategic management goal by identifying and prioritising electricity consumers who are critical to society at the local, regional and national levels. The analysis of related documentation yields three sources of uncertainty (S) interrelated with this multi-level planning (MLP) for emergency response: (S1) the planning process in general, (S2) the decision-making process in particular and (S3) the direction and guidance alongside these processes. Interviews with decision-makers reveal a detailed specification of these sources of uncertainty. The results thus provide a solid basis for further goal-directed improvement of national MLP approaches. Moreover, this specification contributes to scholarly debate on the systemic effects of sources of uncertainty due to a lack of knowledge. Lastly, the findings constitute a thinking framework that is suggested as a foundation for analytical work in similar complex planning environments as well as for evidence-based communication to the wider public concerning risks and resilience.

  • 40.
    Große, Christine
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Olausson, Pär M.
    Mid Sweden University, Faculty of Human Sciences, Department of Humanities and Social Sciences.
    Blind spots in interaction between actors in Swedish planning for critical infrastructure protection2019In: Safety Science, ISSN 0925-7535, E-ISSN 1879-1042, Vol. 118, p. 424-434Article in journal (Refereed)
    Abstract [en]

    Failures in the power supply threaten the safety of developed countries, as they are increasingly dependent on electricity to maintain important societal functions through critical infrastructure. To protect electricity-dependent critical infrastructure, Sweden has implemented a multi-level planning, called Styrel, which involves national-, regional- and local-level actors. This study focuses on interactions among key actors and their roles in the planning as well as the Swedish crisis management system. With evidence from interviews and a survey among the actors, analyses indicate blind spots in the current proceeding, such as the reliance of the outcome of the process on the actors’ commitment to achieve a common understanding of the importance of infrastructure assets and participate in collaborations. This paper reveals that actors lack awareness, knowledge, capability and resources to fulfil their roles in the national planning for critical infrastructure protection. By highlighting interrelations, this study contributes to the international discussion of identification, prioritisation and protection of critical infrastructure to mitigate consequences of power failures for a depending society.

  • 41.
    Gustavsson, André
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Issa, Nicole
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Hållbara kontra konventionella fonder: En prestationsstudie om passivt och aktivt förvaltade fonder2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Every fourth Swede chooses to invest their capital in sustainable funds. There is consensus on the fact that the financial market has been affected by the increased awareness on sustainability which companies have embraced and now manage extensive CSR-work. The goal of this essay is to answer the question whether sustainable funds contributes larger to a portfolios risk adjusted return than conventional mutual funds and if there is a connection between that and passive or active fund management. The report compares 16 funds between the years of 2012 to 2018, whereas 8 funds are conventional and 8 are sustainable. Furthermore, half of each group is passively managed and half is actively managed. The ratios used to measure risk adjusted return in this essay is the Sharpe ratio and the Sortino Ratio. The results show that the conventional funds have a higher risk adjusted return than the sustainable funds. The result is further compared to previous research and discussed towards the hypotheses presented in the theory chapter.

  • 42.
    Gyllin, Åse
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Elektroniska signaturer: -      ”Det kommer ju rasande snabbt det här.”2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    För en arkivarie är autenticitet en viktig del i arkivet, att kunna bevisa olika typer av informations äkthet. I takt med att tekniken utvecklas kommer också nya möjligheter. Möjligheterna kommer tillsammans med frågor och diskussioner om hur detta ska gå att bevara den dagen informationen ska arkiveras.

    Att kunna signera en handling på distans öppnar upp möjligheter för ett snabbare och mer flexibelt arbetssätt. I vissa fall är det även säkrare. Det kan spara tid, kostnader och ge medborgare, företag och myndigheter alternativ till vad som krävs för en handskriven signatur. Frågan är hur långt myndigheter har kommit i användningen av dessa signaturer och hur de hanteras när de når arkivet. Elektroniska signaturer kan ge verksamheter en chans till ett smidigare sätt att arbeta, men de innebär också vissa utmaningar när de ska hanteras.

    Den här uppsatsen är en studie av olika verksamheters arbete kring ämnet elektroniska signaturer. Resultatet kommer från intervjuer med fyra olika myndigheter och totalt sex respondenter där jag frågat om deras hantering av elektroniska signaturer i dagsläget, vad de tror om utvecklingen samt vilka utmaningar de ser. Resultatet visar på en variation i arbetet kring dessa frågor och även olikheter i vilka behov man har av utveckling och projekt angående dessa signaturer.

     

  • 43.
    Hassan, A.
    et al.
    COMSATS University, Islamabad, Pakistan.
    Ghafoor, M.
    COMSATS University, Islamabad, Pakistan.
    Tariq, S.A.
    COMSATS University, Islamabad, Pakistan.
    Zia, T.
    COMSATS University, Islamabad, Pakistan.
    Ahmad, Waqas
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    High Efficiency Video Coding (HEVC)–Based Surgical Telementoring System Using Shallow Convolutional Neural Network2019In: Journal of digital imaging, ISSN 0897-1889, E-ISSN 1618-727XArticle in journal (Refereed)
    Abstract [en]

    Surgical telementoring systems have gained lots of interest, especially in remote locations. However, bandwidth constraint has been the primary bottleneck for efficient telementoring systems. This study aims to establish an efficient surgical telementoring system, where the qualified surgeon (mentor) provides real-time guidance and technical assistance for surgical procedures to the on-spot physician (surgeon). High Efficiency Video Coding (HEVC/H.265)–based video compression has shown promising results for telementoring applications. However, there is a trade-off between the bandwidth resources required for video transmission and quality of video received by the remote surgeon. In order to efficiently compress and transmit real-time surgical videos, a hybrid lossless-lossy approach is proposed where surgical incision region is coded in high quality whereas the background region is coded in low quality based on distance from the surgical incision region. For surgical incision region extraction, state-of-the-art deep learning (DL) architectures for semantic segmentation can be used. However, the computational complexity of these architectures is high resulting in large training and inference times. For telementoring systems, encoding time is crucial; therefore, very deep architectures are not suitable for surgical incision extraction. In this study, we propose a shallow convolutional neural network (S-CNN)–based segmentation approach that consists of encoder network only for surgical region extraction. The segmentation performance of S-CNN is compared with one of the state-of-the-art image segmentation networks (SegNet), and results demonstrate the effectiveness of the proposed network. The proposed telementoring system is efficient and explicitly considers the physiological nature of the human visual system to encode the video by providing good overall visual impact in the location of surgery. The results of the proposed S-CNN-based segmentation demonstrated a pixel accuracy of 97% and a mean intersection over union accuracy of 79%. Similarly, HEVC experimental results showed that the proposed surgical region–based encoding scheme achieved an average bitrate reduction of 88.8% at high-quality settings in comparison with default full-frame HEVC encoding. The average gain in encoding performance (signal-to-noise) of the proposed algorithm is 11.5 dB in the surgical region. The bitrate saving and visual quality of the proposed optimal bit allocation scheme are compared with the mean shift segmentation–based coding scheme for fair comparison. The results show that the proposed scheme maintains high visual quality in surgical incision region along with achieving good bitrate saving. Based on comparison and results, the proposed encoding algorithm can be considered as an efficient and effective solution for surgical telementoring systems for low-bandwidth networks.

  • 44.
    Humble, Niklas
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Computer and System Science.
    Mozelius, Peter
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Computer and System Science.
    Sällvin, Lisa
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Teacher Challenges And Choice Of Programming Tools For Teaching K-12 Technology And Mathematics2019In: Education and new developments (END2019) / [ed] Mafalda Carmo, Porto, Portugal: inScience Press, 2019, Vol. 1, p. 431-435Conference paper (Refereed)
    Abstract [en]

    A current ongoing process in many countries today is to implement programming in K-12 education. With this comes challenges for the involved teachers on how to best teach and integrate programming in their subjects. On the other hand, the introduction of programming could also open opportunities for programming as a new and improved way of learning and understanding technology and mathematics. For Swedish K-12 teachers this should be rapidly implemented, but without any concrete guidelines for how or for which tools to use. The aim of this study was to explore teachers' perceptions of learning and integrating programming in technology and mathematics, and their preferences of programming tools. 

    The overall research strategy was a case study approach, with two instances of a programming course as the case study units. In both course instances the main choice has been between block programming with Scratch, and textual programming with Python. Data was collected in a combination of submitted essays, programming assignments and workshop observations. Findings from a content analysis of the submitted essays have been compared to workshop observations, and to the analysis of programming assignments. 

    Results suggests that the main challenge in learning and integrating programming is the perceived time trouble. In parallel, many teachers highlight the potential benefits of renewing their teaching and learning sessions with programming-based problem solving. Considering the choice between block programming and textual programming several teachers brings up the idea of combining the two rather than excluding one of them. Furthermore, there seems to be minor differences in the preferences of programming tools between teachers with different subjects and different age groups of students. Finally, the most positive finding is the improved self confidence that many teachers show, when their own ability to manage programming in their classrooms increase after learning the fundamentals of programming.  

  • 45.
    Jansson, Herman
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Smarta Blanketter: Dynamiskt webbformulär2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digitization is a fundamental importance for society and something that is constantly sought. Several organizations have not yet digitized various document-based processes, which makes the development difficult since statistical analyzes are time-consuming and costly. CSN is one of the many companies that has still not been able to digitalize their paper forms and has the ambition to replace them all in the least expensive way and as fast as possible. Today, the company stands between buying a service that has applied digitalized solution or implementing its own. This study will explore how a dynamic web form can be implemented to meet the company's ambitions, which will be called “Smarta Blanketter” and stands for Smart forms in English. The possibilities and requirements that can be featured in a digitized solution will be investigated to simplify the customer process and make the underlying process at companies more flexible. Because of the project’s short timeframes, the usability and the dynamic functionality of “Smarta Blanketter” have been prioritized, some visual tool that simplifies the creation of new web forms has not yet been implemented. E-ID signatures, filling of PDF files, and navigation based on previous answer options are just some of the dynamic features applied in “ Smarta Blanketter ” . In order to evaluate whether the dynamic solution improves the customer process, a usability test has been carried out in which the testers fill in an earlier paper application versus the same application inserted in “ Smarta Blanketter ” . The result indicates that the web form optimizes the customer process as customers respond faster and only to necessary questions. Additions of incomplete applications have previously been an issue with the paper forms, which could be completely excluded when filling-in support and validation checks were applied. Replacing CSN's paper applications, could reduce or potentially completely exclude their current budget of ten million Swedish crowns used for sending out their paper forms. The solution that has been designed is not only adapted for the company in this project but can be used for other organizations that have similar paper applications.

  • 46.
    Karelius, Martin
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Kundportal2019Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Dynamic Precision is a company in Herrljunga focused on electronics. A branch of Dynamic Precision is repairs of electronic equipment from third party companies and they send electronic equipment from their end-customers to Dynamic Precision that repair the units and then return them, usually direct to the end-customer. Dynamic Precision had need of a customer portal so that their customers could check the status of their sent in equipment and this customer portal became an internship project. The project was developed in ASPNET Core and its database was created in Microsoft SQL-Server. The project has been completed with somewhat intact time-planning, even though the construction of the middleware took longer time than planned. The focus of the project has been on creating a usable and secure application and a reasonable secure solution has been reached. The planned amount of users is very low, but it still needs to have its accessibility improved so that a users possible handicap wont stop the user from using the application.

  • 47.
    Karlsson, Karl-Johan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    New public management i arkivredovisning: Om Riksarkivets kommunikation kring verksamhetsbaserad arkivredovisning2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Uppsatsen är en kritisk diskursanalys av Riksarkivets kommunikation kring verksamhetsbaserad arkivredovisning utifrån informationen på riksarkivets hemsida, och med ett särskilt fokus på förekomsten av spår av New Public Management. Huvudmaterialet består av Riksarkivets FAQ, och som sidomaterial används även Riksarkivets allmänna föreskrifter.

    Utifrån analytiska begrepp som transitivitet, modalitet, intertextualitet med flera analyseras materialet för att komma fram till slutsatsen att Riksarkivets kommunikation inte innehåller några problematiska mängder spår av New Public Management, och uppsatsen skriver in sig i arkiv- och informationsvetenskapen genom att anknyta till det första steget som tas vid införande av verksamhetsbaserad arkivredovisning.

  • 48.
    Kervel Barth, Alette Jerring van
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Cloudbaserte systemer – deskriptiv beslutningsmodell: Fra litteraturens, kundens og leverandørens perspektiv2019Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Technology that is widely discussed in the business community today is cloud computing and cloud-based systems, as a cloud-based CRM-system. Considering that large companies, such as Google, Netflix and Microsoft, use this type of technology, it is important to ask whether such systems add something to the business or whether it is just an IT trend. The purpose of this study is therefore to create a decision model that will determine whether the company will implement a cloud-based system or maintain it in on-premises. The decision model should shed light on various criteria for cloud-based solutions. The study will be designed with the help of the TOE framework (technology, organization and environment). The aim of the study is to answer the following research questions: (1) What are the consequences and benefits of cloud-based systems? (2) what are the differences between the criteria in the literature compare to what you  practice? (3) Are there differences in the views of the supplier and the customer around this area? The result is based on qualitative interviews with people from the supplier and the customer. The interviews also represent the TOE framework. In addition, an interview with an external expert has been carried out in order to evaluate and support the results of the conducted interviews. The survey has resulted in a decision model with three alternatives and eleven criterias. The analysis shows that there is a difference in what the literature emphasizes compared to what you actually are doing.  The views between the supplier and the customer are also different. Where the customer does not want to lose control and experience a lock-in effect. On the other hand, the supplier wants to deliver the latest technology and give new challenges to their employees. The study can be concluded as follows: the main reason for not implementing the cloud-based system for the customer is; deposit, cost and loss of control. The main reason for implementing the cloud-based system for the vendor is; consultant development, functionality and availability.

  • 49.
    Kim, Young-bin
    et al.
    KDDI Research, Inc., Saitama, Japan.
    Kang, Myung Gil
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Choi, Wan
    Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea.
    On-off Switched Interference Alignment for Diversity Multiplexing Tradeoff Improvement in the 2-User X-Network with Two Antennas2019In: IEEE Transactions on Wireless Communications, ISSN 1536-1276, E-ISSN 1558-2248, Vol. 18, no 1, p. 546-558Article in journal (Refereed)
    Abstract [en]

    To improve diversity gain in an interference channel and hence to maximize diversity multiplexing tradeoff (DMT), we propose on-off switched interference alignment (IA) where IA is intermittently utilized by switching IA on/off. For on-off switching, either IA with symbol extension or IA with Alamouti coding is adopted in this paper. Deriving and analyzing DMT of the proposed schemes, we reveal that the intermittent utilization of IA with simultaneous non-unique decoding can improve DMT in the 2-user X-channel with two antennas. Both the proposed schemes are shown to achieve diversity gain of 4 and DoF per user of 4/3 . In particular, the on-off switched IA with Alamouti coding, to the best of our knowledge, surpasses any other existing schemes for the 2-user X-channel with two antennas and nearly approaches the ideal DMT. 

  • 50.
    Klareld, Ann-Sofie
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Forsström, Stefan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Engvall, Tove
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Blockchainteknologi och arkiv2019In: Nordisk Arkivnyt, ISSN 0546-2851, no 1, p. 46-47Article in journal (Other (popular science, discussion, etc.))
    Abstract [sv]

    Blockchain, främst känd som teknologin bakom Bitcoin, kan användas till mycket mer än kryptovalutor. World Economic Forum har nyligen listat 65 exempel på hur tekniken kan bidra till att lösa olika miljöutmaningar och MIT:s tidskrift Technology Review har beskrivit hur blockchain används i ett flyktingläger för att människor ska kunna köpa förnödenheter utan att behöva vare sig identitetshandlingar eller kontanter. Med nya tekniker för att hantera mänskliga aktiviteter följer också nya former för dokumentation av dessa. I denna artikel kommer vi därför ge en översiktlig bild av hur blockchain kan användas inom arkivsektorn.

12 1 - 50 of 93
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf