The PETRAS project aims to address privacy, ethics, trust, reliability, acceptability, and security issues for the Internet of Things. It will take an integrated social science and technical approach through collaborative projects across nine UK universities and other partners. The projects will be organized into streams and constellations focused on different sectors to provide insights and recommendations.
What is big data, and what are its potential benefits and risks?
Presentation given by Sir Mark Walport at the Oxford Martin School on 3 December 2013.
A Czech, private research centre settled in Liberec city is mainly focusing on applied research in ICT sector, technology transfer and fund raising for research and innovation activities.
The International journal of Multimedia & Its Applications (IJMA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Multimedia & its applications. The journal focuses on all technical and practical aspects of Multimedia and its applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding recent developments this arena, and establishing new collaborations in these areas.
Cities around the world are facing urgent privacy and cyber-physical security threats that will change how they are working with Smart and sustainable solutions. Meanwhile, cities in the EU are confronted with new regulations that will force the processes and systems that control data at a city level to be changed and redesigned. In this report, Smart City Catalyst addresses the lacking knowledge of how cities are currently approaching these realities and provides basic guidelines and recommendations for city actors interested in improving cyber-physical security and upholding the privacy of citizens.
IoT Community - MassTLC - Harvard Business School joint open forumMassTLC
On September 24, MassTLC was lucky enough to have partnered for a forum with Harvard Business School’s Institute for Strategy and Competitiveness, to discuss where Massachusetts sits in comparison to other key cities in the US.
Christian Ketels, a Principal Associate at HBS, provided us with a number of insights from his team’s research to help guide the discussion.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
New ITU Standard on Identity & Access ManagementITU
A new ITU international standard will bring greater business relevance to the identity and access management (IAM) systems employed by enterprises to manage electronic identities and control access to ICT resources. The standard will enable more intuitive, cost-effective assignment and management of IAM roles and user permissions.
The standard – Recommendation ITU-T X.1257 “Identity and access management taxonomy” – was developed by the ITU standardization expert group responsible for building confidence and security in the use of ICTs, ITU-T Study Group 17.
ITU-T X.1257 addresses the lack of business meaning in IAM roles and permissions which has led to unnecessary complexity in the operation of IAM systems. This complexity affects the entire IAM lifecycle, often leading to the need for costly maintenance of IAM systems as well as conditions prone to the emergence of security vulnerabilities in enterprise systems.
ITU-T X.1257 details requirements for a “task-based access management” framework. Irrespective of industry sector or the size of the enterprise in question, this framework has four clear advantages:
IAM Role Engineers will be in a position to prevent role and entitlements explosion
Application Teams can implement Separation of Duties across multiple applications
Access Reviewers can automate both potential and historical user entitlements
Business Architects will have the ability to perform SIM-related Business Process and Application Rationalization
For more information on ITU-T Study Group 17, please consult the group’s homepage at:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx
What is big data, and what are its potential benefits and risks?
Presentation given by Sir Mark Walport at the Oxford Martin School on 3 December 2013.
A Czech, private research centre settled in Liberec city is mainly focusing on applied research in ICT sector, technology transfer and fund raising for research and innovation activities.
The International journal of Multimedia & Its Applications (IJMA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Multimedia & its applications. The journal focuses on all technical and practical aspects of Multimedia and its applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding recent developments this arena, and establishing new collaborations in these areas.
Cities around the world are facing urgent privacy and cyber-physical security threats that will change how they are working with Smart and sustainable solutions. Meanwhile, cities in the EU are confronted with new regulations that will force the processes and systems that control data at a city level to be changed and redesigned. In this report, Smart City Catalyst addresses the lacking knowledge of how cities are currently approaching these realities and provides basic guidelines and recommendations for city actors interested in improving cyber-physical security and upholding the privacy of citizens.
IoT Community - MassTLC - Harvard Business School joint open forumMassTLC
On September 24, MassTLC was lucky enough to have partnered for a forum with Harvard Business School’s Institute for Strategy and Competitiveness, to discuss where Massachusetts sits in comparison to other key cities in the US.
Christian Ketels, a Principal Associate at HBS, provided us with a number of insights from his team’s research to help guide the discussion.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
New ITU Standard on Identity & Access ManagementITU
A new ITU international standard will bring greater business relevance to the identity and access management (IAM) systems employed by enterprises to manage electronic identities and control access to ICT resources. The standard will enable more intuitive, cost-effective assignment and management of IAM roles and user permissions.
The standard – Recommendation ITU-T X.1257 “Identity and access management taxonomy” – was developed by the ITU standardization expert group responsible for building confidence and security in the use of ICTs, ITU-T Study Group 17.
ITU-T X.1257 addresses the lack of business meaning in IAM roles and permissions which has led to unnecessary complexity in the operation of IAM systems. This complexity affects the entire IAM lifecycle, often leading to the need for costly maintenance of IAM systems as well as conditions prone to the emergence of security vulnerabilities in enterprise systems.
ITU-T X.1257 details requirements for a “task-based access management” framework. Irrespective of industry sector or the size of the enterprise in question, this framework has four clear advantages:
IAM Role Engineers will be in a position to prevent role and entitlements explosion
Application Teams can implement Separation of Duties across multiple applications
Access Reviewers can automate both potential and historical user entitlements
Business Architects will have the ability to perform SIM-related Business Process and Application Rationalization
For more information on ITU-T Study Group 17, please consult the group’s homepage at:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx
Social Determinants and Global Health
Julius Global Health, Julius Center, University Medical Center Utrecht, The Netherlands.
For more information: www.globalhealth.eu
Case Study: Strategy / Strategic Plan for Charity / Non-ProfitChief Innovation
This is a Case Study of a Strategic Plan we did for a Charity in the southwest U.S.. Posting this to show people an example of what this looks like, and to demonstrate that they can do it themselves instead of paying for a consultant. For larger charities, professional consultants may make sense, but for the smaller ones, a smart Board Member and some volunteers can probably do this. This is based off our own Strategy Methodology for Small Businesses.
Primeros pasos en Facebook. Manual para abrir y gestionar un perfil personal de manera responsable. Cuidar la privacidad, hacer listas de amigos y aprovechar todas las posibilidades de esta red social
Susanna Sansone's talk at the "Beyond Open" Knowledge Dialogues/Open Data Hong Kong event on research data, hosted at the Hong Kong Innocentre on Monday 20 November 2017.
Presentation on the work we've done within BeSTGRID as it relates to bioinformatics in NZ, for the 2010 Bioinformatics Symposium https://www.bestgrid.org/NZ-Bioinformatics-Symposium-2010
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
This presentation explains the NSF EAGER #1650445 Cybersecurity Research Transition To Practice (TTP) Acceleration funded program led by Internet2, inviting researchers and practitioners of IT and cybersecurity to participate.
Building a Blockchain-based Reputation Infrastructure for Open Research. Ca...Carmen Holotescu
Presentation for ICCMAE 2022: The 2nd International Conference on Computational Methods and Applications in Engineering May 7-8, 2021
Authors:
Victor HOLOTESCU, PhD Student,
Andrei TERNAUCIUC, PhD
Radu VASIU, PhD
Politehnica University of Timișoara, Romania
Carmen HOLOTESCU, PhD
”Ioan Slavici” University of Timișoara, Romania
Cosmin CIORANU, PhD
UEFISCDI, Bucharest, Romania
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
With the broader adoption of digital technologies and AI, organisations face the emerging risks of AI, the unfamiliar, and the intensified risk of cybersecurity, the familiar. AI and cybersecurity are intertwined, but risk silos are often created when they are dealt with at the technology and governance levels. This talk will explore the interactions between responsible AI and cybersecurity risks via industry case studies. It will show how we can break down the risk silos and use emerging trust-enhancing technologies, architecture and end-to-end software engineering/DevOps practices to connect the two worlds and uplift the risk management posture for both.
The European Open Science Cloud: just what is it?Carole Goble
Presented at Jisc and CNI leaders conference 2018, 2 July 2018, Oxford, UK (https://www.jisc.ac.uk/events/jisc-and-cni-leaders-conference-02-jul-2018). The European Open Science Cloud. What exactly is it? In principle it is conceived as a virtual environment with open and seamless services for storage, management, analysis and re-use of research data, across borders and scientific disciplines. How? By federating existing scientific data infrastructures, currently dispersed across disciplines and Member States. In practice, what it is depends on the stakeholder. To European Research Infrastructures it’s a coordinated mission to organise and exchange their data, metadata, software and services to be FAIR – Findable, Accessible, Interoperable, Reusable – and to use e-Infrastructures, either EU or commercial. To EU e-Infrastructures offering data storage and cloud services, it’s a funding mission to integrate their services, policies and organisational structures, and to be used by the Research Infrastructures. To agencies it’s a means to promote Open Science, standardisation, cross-disciplinary research and coordinated investment with a dream of a “one stop shop” for researchers. And for Libraries?
To foster greater and more consistent use of the new 100 Gbps connections that is being deployed in the national RNP backbone, the e-Cyber project aims at delivering high-performing services to the most infrastructure-demanding research centers in Brazil. To do this, the project is getting inspired by the “superfacility” concept, which is adopted by initiatives like GRP (Global Research Platform) and EOSC (European Open Science Cloud). However, one of our biggest challenges is to engage the client institutions and bring them to co-create solutions and participate in the project governance.
In this presentation, I highlighted the significance of adopting development methods for the successful development of IoT-based systems. By adopting systematic development methods, we can ensure that IoT systems are built with a structured approach, minimizing risks and enhancing overall reliability. I discussed the benefits of utilizing development methods, such as improved project management, streamlined development processes, and the ability to consistently deliver high-quality IoT solutions.
Susanna Sansone - OpenCon Oxford, 1st Dec 2017Crossref
FAIR Data: principles and practices
A growing worldwide movement for reproducible research encourages making data, along with the experimental details, available according to the FAIR principles of Findability, Accessibility, Interoperability and Reusability (see http://www.nature.com/articles/sdata201618). Several data management, sharing policies and plans have emerged and, in parallel, a growing number of community-based groups are developing hundreds of standards to harmonize the reporting of different experiments. Community mobilization is evident also by the number of efforts and alliances, but also data journals and data centres being launched.
Alisdair Ritchie gave a presentation talking about the work PETRAS is doing to protect and secure IoT devices.
This slideshare was originally presented at the East Midlands Cyber Security Forum's Summer event on 6th June 2017 at University of Nottingham.
https://emcsf.org.uk/
Australia's Environmental Predictive CapabilityTERN Australia
Federating world-leading research, data and technical capabilities to create Australia’s National Environmental Prediction System (NEPS).
Community consultation presentation.
3-12 February 2020
Dr Michelle Barker (Facilitator)
(Presentation v5)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
PETRAS Hub Overview
1. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
PETRAS: Hub Overview
Jeremy Watson: UCL – Director
Emil Lupu: Imperial College – Deputy Director
2. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Deliver real co-produced impactful and cross-sectoral technical and
socioeconomic benefit
• Place the UK as world-leader in expertise and deployment of trusted
IoT technology
• Create a cross-disciplinary environment across research domains,
industries, and government departments.
• Create a social platform for innovation and co-creation with users
and stakeholders
• Provide an enduring legacy from the PETRAS Hub, beyond the end of
the funded period
Aims – to:
3. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Use an integrated approach of collaborative social and
physical science expertise
• Remove barriers to the beneficial adoption of Internet of
Things
• Address generic knowledge gaps through case study
approaches covering major sectors
• Use innovative methodologies including ‘in the wild’ and
citizen science
Principles
4. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Cybersecurity of the Internet of Things
Organisation
Steering board
Warwick
UCL
Healthcare
Node
Cities
Node
Hub
Cardiff
spoke
Soton
spoke
~ 50 Public & private sector research partners
Acceler-
ator
Oxford
Lancas-
ter
Edin’bro
spoke
Surrey
spoke
Shared
admin
Imperial
Operations group
User &
Research boardIoTUK
Landscape
5. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Cybersecurity of the Internet of Things
Organisation
Steering board
Warwick
UCL
Healthcare
Node
Cities
Node
Hub
Cardiff
spoke
Soton
spoke
~ 50 Public & private sector research partners
Acceler-
ator
Oxford
Lancas-
ter
Edin’bro
spoke
Surrey
spoke
Shared
admin
Imperial
Operations group
User &
Research board
£10m
Demonstrator
‘CityVerve’
Manchester
2 of 7 NHS-E
projects:
Surrey &
Bristol
SBRI Call
tba
£9.8m Hub
DCMS/EPSRC
6. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Key Facts about PETRAS
• 9 world leading universities via
the core and spoke model (4
from the AlanTuring Institute)
• Combined hub value: £23m
• Blackett Review expertise
• 47 partners at submission
combining presence in the UK,
Central Europe and America
(giving International links and
perspective)
• Inter– and multi-disciplinary
focus
7. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Governance
Terms of reference are available
for each board
A rigorous set of processes providing
independent ‘steering’ including ethical aspects
of projects, knowledge needs and technology
advice, and executive management of projects
9. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Privacy & Trust
• Safety & Security
• Harnessing Economic Value
• Adoption & Acceptability
• Standards, Governance & Policy
Stream programme
Generic learning outcomes – each co-led by a social and physical scientist
Projects grouped by type into ‘Constellations’, sample one or more of the Stream threads
10. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Ambient environments
• Health & Care
• Infrastructure
• Supply & Control Systems
• Transport & Mobility
• Identification
• Design & Behaviour
Constellation groupings
Sectorally-themed collections of projects which provide evidence to the Stream programme
Projects grouped into ‘Constellations’ according to theme type
11. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Discipline balance
– The PETRAS domain of study requires a balance between social and physical science
and engineering challenges, so each of the Streams is co-led by academics representing
these two disciplines
• PDRA pool
– Post doctoral research fellows will be hired for the whole three year Hub programme
and will be attached to a particular stream; they will be deployed to Constellation
projects and bring knowledge back to their stream
• Interim Call
– It is anticipated that much of the first months will be spent in setting contexts and
establishing baselines. In month 10, an internal Call for proposals will be issued, shaped
by the needs of User Partners and by emerging technologies. A further Call in Year 2
will aim at converging knowledge to Stream conclusions
• Innovation Champions (x2)
– Will provide active professional links to the greater IoTUK community, Catapults, etc.
Innovation in the execution process
12. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
• Publicity and knowledge dissemination are a priority
• Possible business models beyond the end of the funded period will be
considered from the outset
• Relationships with User Partners will include considerations of
relationship and value sustainability
• Relationships with relevant Academies and Professional Engineering
Institutions will be built to create mutually-beneficial delivery platforms
Creating an enduring legacy
It is the collaborators’ intention to create an interest group with enduring value, serving the
UK government and business sectors
13. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Workshops
across the
country
Next generation of
researchers
Multi-level partner
engagement
Steering, streams, constellations
Two large symposia
Website hub
Truly transdisciplinary
publicationsImpact
Champions
Partnership Fund
Secondments, fellowships
Specialist
Journalist
Common language
Sociotechnical tools
UK world-leading in research & practice
Policy advice and innovation
Leading in standardisation
Using:
Impact call
via Strategic Fund
Routes to
Impact
14. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Transport & Mobility
Transport & Mobility
projects will include
smart street planning, pricing
& maintenance and also
developing solutions for
communications among
autonomous and semi-
autonomous cars and
infrastructures.
Lead: Professor Carsten
Maple (Warwick)
15. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Health & Care
SeNTH - focus on: 1.Threat
modelling and analysis for
body sensor networks; 2.
Security mechanisms that can
be provided on miniaturised
low power ASICs; 3.
Establishing a test-bed with
selected scenarios.
DAISH - user trust in
medical applications of IoT.
Project will use sandpits to
identify problems impairing
users’ trust and will define a
code of practises for IoT.
Lead: Emil Lupu (Imperial
College)
16. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Design & Behaviour
This Constellation will
consider the role that Design
plays in influencing the
adoption of IoT. In particular,
how Design and Engineering
can actively encourage or
discourage behaviours, so
that Privacy and Trust are
enhanced, and adoption is
promoted. Design charrettes
will be used to obtain user
responses to a range of
interventions.
Lead: Professor Rachel
Cooper (Lancaster)
17. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Infrastructure
Includes 1. NIRC, which
looks, from a policy angle, at
approaches in various
countries and across borders
to manage IoT threats and
increased attack surfaces. 2.
ALIoTT - tools to analyse
threats in many contexts,
creating, validating and
piloting methods and
software across the hub and
with User Partners, including
government agencies.
Lead: Professor Jeremy
Watson (UCL)
18. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Identification
AACIoT - rating the
trustworthiness of
identification systems based
on the wider environment
surrounding the IoT agent
PEISI evaluating ‘identifying’
technologies, protocols, and
procedures alongside privacy
strategies, to design robust
solutions that deliver a
balance between
identifiability and privacy of
IoT technology.
Lead: Professor Luciano
Floridi (Oxford)
19. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Supply & Control Systems
Connectivity and intelligence
are of economic importance to
the UK. IoT offers integrated
control systems and supply
chains. Projects include:
Developing Secure IoT-
augmented Control Systems
and Exploring EconomicValue
of IoT Data in Cyber-physical
Supply Chains. The projects
will draw expertise from a
number of Hub research
organisations working with
industrial partners.
Lead: Professor Carsten Maple
(Warwick)
20. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Constellation example: Ambient Environments
The QEOP offers an ideal
setting for scalable,‘In the
Wild’, IoT developments.
Concepts around security
versus adaptability with
cross-layered network wide
protocols for low powered
IoT Devices will be
investigated . A combination
of In the Wild experiments
and focus groups will inform
the boundaries of privacy,
trust and personalisation.
Lead: Professor Andy
Hudson-Smith (UCL)
21. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
PETRAS: Governance detail
Jeremy Watson: UCL – Director
Emil Lupu: Imperial College – Deputy Director
22. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Governance
Steering Board
Operations Group
User Research
Board
Ethics sub-group
Day-to-day operations‘Push and Pull’
Governance
Terms of reference available for each board
23. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Steering Board [SB] (including Ethics Sub-Group)
Membership
• Key strategic users – public and private sector, independent chair from private sector
• Funding bodies – DCMS, EPSRC, Innovate UK
• PETRAS PI, CoIs, Impact Champions
Role and Responsibilities
• Receives budgetary and resourcing reports from the Operations Group
• Oversees and advises on Hub portfolio management with advice from the User and Research
Board, ensuring it is aligned to the needs of Users
• Formally approves allocated projects and use of Strategic Funds and Partnership Research Funds
• Sets strategy for knowledge transfer and user engagement
• Sets ethics guidelines and advise project on ethics considerations (Ethics Sub-Group)
Terms of reference to be written for each board
24. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
User & Research Board [URB]
Membership
• Technical leaders from user partners, government subject-matter experts
• Academic experts from Hub and Spokes
• PETRAS Impact Champions
Role and Responsibilities
• Advises on User needs and new technology
• Provides feedback on project proposals, project progress and project outcomes (Strategic Fund,
and Partnership Research Fund)
• Advises on scope and priorities for Calls for Proposals Y2 and Y3
• Advises on training programme and people development
• Provides volunteers for Mentorship Programme
Terms of reference to be written for each board
25. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Operations Group [OG]
Membership
• Hub CoIs and Spoke project leaders
• PETRAS Programme Manager
• Admin representatives of lead HEIs
• PM and Impact Champions
Role and Responsibilities
• Manages the PDRA resource pool and its deployment into projects based on the
recommendations from the URB
• Manages the deployment of the Strategic Resource Fund and Partnership Fund
• Sets procedures for, and executes, project progress monitoring (technical and financial) and
reporting
• Sets programme of activities for dissemination, user engagement and communications
• Sets procedures for, and executes, monitoring of expenditure and matched funding tracking
• Sets procedures for, and oversees IP management
Terms of reference to be written for each board
26. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Meetings
Steering
board
User panel
Steering
board
User panel
Annual cycle
Operations
Group
Operations
Group
Operations
Group
Operations
Group
Quarterly
cycle
27. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Shared Hub Resources
• PETRAS Web page
• Hub Directory
• Mailing Lists and contact points
• Training and Training material (Baselining)
• PDRA Pool and Expertise
• Shared recruitment approach
• Ops management Google Sheet:
https://docs.google.com/spreadsheets/d/19w6lrMhwrfKiXyokHrPSI3BH5ZlGuj4j0a-
B8nJhIHE/edit#gid=0
• Digital Catapult share:
https://docs.google.com/spreadsheets/d/1XI7d7KYJmnC2h9stqqLFR0nyPDn_UxEBGcJQQ24Yb
w4/edit#gid=0
• References:
https://docs.google.com/spreadsheets/d/19w6lrMhwrfKiXyokHrPSI3BH5ZlGuj4j0a-
B8nJhIHE/edit#gid=1677177634
28. PETRAS Privacy, Ethics,Trust, Reliability, Acceptability, and Security
for the Internet of Things
Aspirational points
Further funding
• Lloyds Register – target £1m for aligned projects (Foundation plus Group)
• Private sector cash contributions for specific technology demonstrators
Wider engagement
• International
• Other Research Councils (and the emerging post-Nurse RCUK)
• Professional Engineering Institutions (publications, streamed video, events, etc.)
• Engagement with new User Partners
In-line planning
• Website, conference, engagement and KT events
• New Calls
• Business model for PETRAS legacy