With the introduction of interconnected cross-platform middleware, a new area of opportunities fo... more With the introduction of interconnected cross-platform middleware, a new area of opportunities for ubiquitous/pervasive computing has emerged. Context aware applications can be enhanced to practically and realistically incorporate multiple facets of human–machine interactions in everyday life that are not limited to a device-centred model for deducing context. This thesis proposes that this model can rather be extended to a human-centred, device and platform independent model, based on a personal distributed application and data cloud ecosystem.For this to be achieved, webinos, an innovative set of web runtime extensions that enable web applications and services to be used and shared consistently and securely over a broad spectrum of converged and connected devices, is used to provide this ecosystem. The webinos Context Awareness Framework, consisting of the Context Manager and Context API, described here, is accessible to each webinos-enabled application. After strict policy enforc...
The Use Case is organised by two medical first responder organisations from Germany and Austria i... more The Use Case is organised by two medical first responder organisations from Germany and Austria including their respective disaster relief units. It will be organised as a field exercise focusing on the response phase of the disaster risk management cycle. The scenario and exercise are envisioned at a regional scale. Weather: A heavy storm is ongoing, which uproots several trees and causes a blackout. Safety/Security: no specific security threats are taken into account. Safety of the staff and volunteers has to be assured. Special Equipment: in addition to the provided S&R Tools, the Use Case will use the train compartment, the earthquake house, and gas street of the exercise area. The disaster relief unit of the Johanniter will bring their SanHist, Logistics Trailer and communication equipment. Doctrines/ Standards/ Laws: INSARAG Guidelines, Plans of the training ground, Austrian Sanitary Act, SOPs of the disaster relief unit
This Ethical Protocol materialises this commitment by identifying the partner's responsibilit... more This Ethical Protocol materialises this commitment by identifying the partner's responsibilities and describing the procedures and methodology to ensure that S&R research activities and pilot testing are ethically sound.<br> In addition, this Deliverable provides guidelines to ensure the compliance of the research activities with EU and national data protection law, including the General Data Protection Regulation (GDPR). It also contains templates of an information sheet and an informed consent form to be presented to all participants in the research and data collection activities to ensure they are fully aware of the extent<br> of their involvement in the project and how their data is safeguarded and used.<br> Finally, compliance of the project research activities, and hence of the S&R platform and methodology, with ethical standards and guidelines is further ensured through the establishment of an Ethical Board of experts. This Ethical Board will monitor all...
This deliverable presents the initial version of the Data Management Plan, which is directly conn... more This deliverable presents the initial version of the Data Management Plan, which is directly connected with the work performed under tasks T10.1 – "Project coordination and management" and T10.2 - "T10.2 – Scientific & Technical MGT", in the context of WP10 – "Project Coordination and Quality Assurance". It serves as the initial plan for the collection, organisation, storing and sharing of the knowledge and data created within the project. The described data management plan is formulated based on several inputs, namely: a) the SnR Description of Action (DOA) document, b) the European Commission guidelines for data management of H2020 research projects and c) the input from the project consortium members.<br> The document contains the appropriate methodologies, tools and repositories for data management and dissemination of all available information generated by the SnR project. Such information includes, but is not limited to, scientific publicati...
The Search and Rescue management activities aim to reach the objectives according to the project ... more The Search and Rescue management activities aim to reach the objectives according to the project plan and within the allocated budget, resources, and with the needed quality. Therefore, this deliverable defines the structures, the procedures, and the supporting documents needed to assure the quality of the project deliverables and project management activities<br> With regards to the project management structure, it is based on the following bodies and roles: (i) the Project Coordinator (PC) as the main responsible of coordination and interface to the Commission (ii) the General Assembly (GA) as the supervisory body for the project execution with monitoring functions and decision-making body in all relevant project matters (iii) the Scientific-Technical Coordinator (STC) as the main responsible for the overall project scientific and technical implementation, (iv) the Scientific Technical Committee (STC) as the body supervising accordingly the scientific and technical activitie...
The present deliverable aims at introducing the overall engagement approach that the S&R project ... more The present deliverable aims at introducing the overall engagement approach that the S&R project will follow, which lays down the foundations of the Dissemination and Communication Strategy and related action plan. The main purpose of this document is to ensure that the project outputs and tangible outcomes are widely disseminated to the appropriate target audiences, at appropriate times along the project lifecycle, via appropriate tools and channels, and that those who can contribute to their development, evaluation, uptake and exploitation can be identified and encouraged to proactively interact with the project on a regular and systematic basis. The deliverable first considers the engagement process as a whole, presenting the most fundamental concepts and detailing the objectives for engaging with the Crisis Management environment. Such engagement process is very complex and has to take place at different levels and moments, with different stakeholders and through different mecha...
Inside the SnR research project, it is attempted for the first time the adaptation of a promising... more Inside the SnR research project, it is attempted for the first time the adaptation of a promising field technology, this of Membrane Inlet Mass Spectrometry (MIMS), to the specific needs of Search and Rescue (SaR) operations, in order to develop the 'RESCUE-MIMS' device. Though, it is crucial to consider all the challenges and limitations when measuring with field chemical technologies in the harsh environment that is usually encountered in the disaster scene, depending on the disaster type; e.g. dust, smoke, high temperatures, heat radiation, high RH%, strong chemical background interferences that are masking the results, etc.<br> The RESCUE-MIMS device delivered is a prototype of technology readiness level (TRL) 6 that has been designed and developed in the prospect of satisfying the majority of the end-users requirements that have been indicated inside D1.2. It is provided in a configuration of a robust peli-box luggage meeting the KPIs described in the DoA, namely:...
The purpose of this document is to report the ethical issues, or any other complication arose fro... more The purpose of this document is to report the ethical issues, or any other complication arose from the beginning of SPHINX implementation to date and how these were treated. The document focuses on three ethical issues: Processing of personal data, discovery of incidental findings and misuse of research findings which were highlighted in (Deliverable 1.10, 2019).
Recent studies report that cybersecurity breaches noticed in hospitals are associated with low le... more Recent studies report that cybersecurity breaches noticed in hospitals are associated with low levels of personnel’s cybersecurity awareness. This work aims to assess the cybersecurity culture in healthcare institutions from middle- to low-income EU countries. The evaluation process was designed and performed via anonymous online surveys targeting individually ICT (internet and communication technology) departments and healthcare professionals. The study was conducted in 2019 for a health region in Greece, with a significant number of hospitals and health centers, a large hospital in Portugal, and a medical clinic in Romania, with 53.6% and 6.71% response rates for the ICT and healthcare professionals, respectively. Its findings indicate the necessity of establishing individual cybersecurity departments to monitor assets and attitudes while underlying the importance of continuous security awareness training programs. The analysis of our results assists in comprehending the counterme...
Proceedings of the International Conferences on ICT, Society and Human Beings (ICT 2020), Connected Smart Cities (CSC 2020) and Web Based Communities and Social Media (WBC 2020), 2020
The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent r... more The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent reality. Its consequences vary from political and societal to technical and economic. These side effects provided fertile ground for a noticeable cyber-crime increase targeting critical infrastructures and, more specifically, the health sector; the domain suffering the most during the pandemic. This paper aims to assess the cybersecurity culture readiness of hospitals’ workforce during the COVID-19 crisis. Towards that end, a cybersecurity awareness webinar was held in December 2020 targeting Greek Healthcare Institutions. Concepts of cybersecurity policies, standards, best practices, and solutions were addressed. Its effectiveness was evaluated via a two-step procedure. Firstly, an anonymous questionnaire was distributed at the end of the webinar and voluntarily answered by attendees to assess the comprehension level of the presented cybersecurity aspects. Secondly, a post-evaluation phi...
The Sphinx project aims to provide a Universal Cyber Security Toolkit for the Health and Care Dom... more The Sphinx project aims to provide a Universal Cyber Security Toolkit for the Health and Care Domain. This deliverable outlines the basic steps for the implementation of the information security strategy within health sector. Provided that Sphinx R&D activities should comply with established practices as well as the legal framework for ethical, privacy and data protection issues, the deliverable identifies restrictions and provides guidelines in relation to privacy and data protection as well as access to personal information. The goal is to ensure that the project methods, tools, technologies and processes will be able to be adopted without any legal barrier at least as this concerns the national (three pilots) and the European legal and ethical framework and mainly the GDPR.
Citizen sensing applications need to have a number of users defined that ensures their effectiven... more Citizen sensing applications need to have a number of users defined that ensures their effectiveness. This is not a straightforward task because neither the relationship between the size of the userbase or its effectiveness is easily quantified, nor is it clear which threshold for the number of users would make the application ‘effective’. This paper presents an approach for estimating the number of users needed for location-based crowdsourcing applications to work successfully, depending on the use case, the circumstances, and the criteria of success. It circumvents various issues, ethical or practical, in performing real-world controlled experiments and tackles this challenge by developing an agent-based modelling and simulation framework. This framework is tested on a specific scenario, that of missing children and the search for them. The search is performed with the contribution of citizens being made aware of the disappearance through a mobile application. The result produces ...
With the introduction of interconnected cross-platform middleware, a new area of opportunities fo... more With the introduction of interconnected cross-platform middleware, a new area of opportunities for ubiquitous/pervasive computing has emerged. Context aware applications can be enhanced to practically and realistically incorporate multiple facets of human–machine interactions in everyday life that are not limited to a device-centred model for deducing context. This thesis proposes that this model can rather be extended to a human-centred, device and platform independent model, based on a personal distributed application and data cloud ecosystem.For this to be achieved, webinos, an innovative set of web runtime extensions that enable web applications and services to be used and shared consistently and securely over a broad spectrum of converged and connected devices, is used to provide this ecosystem. The webinos Context Awareness Framework, consisting of the Context Manager and Context API, described here, is accessible to each webinos-enabled application. After strict policy enforc...
The Use Case is organised by two medical first responder organisations from Germany and Austria i... more The Use Case is organised by two medical first responder organisations from Germany and Austria including their respective disaster relief units. It will be organised as a field exercise focusing on the response phase of the disaster risk management cycle. The scenario and exercise are envisioned at a regional scale. Weather: A heavy storm is ongoing, which uproots several trees and causes a blackout. Safety/Security: no specific security threats are taken into account. Safety of the staff and volunteers has to be assured. Special Equipment: in addition to the provided S&R Tools, the Use Case will use the train compartment, the earthquake house, and gas street of the exercise area. The disaster relief unit of the Johanniter will bring their SanHist, Logistics Trailer and communication equipment. Doctrines/ Standards/ Laws: INSARAG Guidelines, Plans of the training ground, Austrian Sanitary Act, SOPs of the disaster relief unit
This Ethical Protocol materialises this commitment by identifying the partner's responsibilit... more This Ethical Protocol materialises this commitment by identifying the partner's responsibilities and describing the procedures and methodology to ensure that S&R research activities and pilot testing are ethically sound.<br> In addition, this Deliverable provides guidelines to ensure the compliance of the research activities with EU and national data protection law, including the General Data Protection Regulation (GDPR). It also contains templates of an information sheet and an informed consent form to be presented to all participants in the research and data collection activities to ensure they are fully aware of the extent<br> of their involvement in the project and how their data is safeguarded and used.<br> Finally, compliance of the project research activities, and hence of the S&R platform and methodology, with ethical standards and guidelines is further ensured through the establishment of an Ethical Board of experts. This Ethical Board will monitor all...
This deliverable presents the initial version of the Data Management Plan, which is directly conn... more This deliverable presents the initial version of the Data Management Plan, which is directly connected with the work performed under tasks T10.1 – "Project coordination and management" and T10.2 - "T10.2 – Scientific & Technical MGT", in the context of WP10 – "Project Coordination and Quality Assurance". It serves as the initial plan for the collection, organisation, storing and sharing of the knowledge and data created within the project. The described data management plan is formulated based on several inputs, namely: a) the SnR Description of Action (DOA) document, b) the European Commission guidelines for data management of H2020 research projects and c) the input from the project consortium members.<br> The document contains the appropriate methodologies, tools and repositories for data management and dissemination of all available information generated by the SnR project. Such information includes, but is not limited to, scientific publicati...
The Search and Rescue management activities aim to reach the objectives according to the project ... more The Search and Rescue management activities aim to reach the objectives according to the project plan and within the allocated budget, resources, and with the needed quality. Therefore, this deliverable defines the structures, the procedures, and the supporting documents needed to assure the quality of the project deliverables and project management activities<br> With regards to the project management structure, it is based on the following bodies and roles: (i) the Project Coordinator (PC) as the main responsible of coordination and interface to the Commission (ii) the General Assembly (GA) as the supervisory body for the project execution with monitoring functions and decision-making body in all relevant project matters (iii) the Scientific-Technical Coordinator (STC) as the main responsible for the overall project scientific and technical implementation, (iv) the Scientific Technical Committee (STC) as the body supervising accordingly the scientific and technical activitie...
The present deliverable aims at introducing the overall engagement approach that the S&R project ... more The present deliverable aims at introducing the overall engagement approach that the S&R project will follow, which lays down the foundations of the Dissemination and Communication Strategy and related action plan. The main purpose of this document is to ensure that the project outputs and tangible outcomes are widely disseminated to the appropriate target audiences, at appropriate times along the project lifecycle, via appropriate tools and channels, and that those who can contribute to their development, evaluation, uptake and exploitation can be identified and encouraged to proactively interact with the project on a regular and systematic basis. The deliverable first considers the engagement process as a whole, presenting the most fundamental concepts and detailing the objectives for engaging with the Crisis Management environment. Such engagement process is very complex and has to take place at different levels and moments, with different stakeholders and through different mecha...
Inside the SnR research project, it is attempted for the first time the adaptation of a promising... more Inside the SnR research project, it is attempted for the first time the adaptation of a promising field technology, this of Membrane Inlet Mass Spectrometry (MIMS), to the specific needs of Search and Rescue (SaR) operations, in order to develop the 'RESCUE-MIMS' device. Though, it is crucial to consider all the challenges and limitations when measuring with field chemical technologies in the harsh environment that is usually encountered in the disaster scene, depending on the disaster type; e.g. dust, smoke, high temperatures, heat radiation, high RH%, strong chemical background interferences that are masking the results, etc.<br> The RESCUE-MIMS device delivered is a prototype of technology readiness level (TRL) 6 that has been designed and developed in the prospect of satisfying the majority of the end-users requirements that have been indicated inside D1.2. It is provided in a configuration of a robust peli-box luggage meeting the KPIs described in the DoA, namely:...
The purpose of this document is to report the ethical issues, or any other complication arose fro... more The purpose of this document is to report the ethical issues, or any other complication arose from the beginning of SPHINX implementation to date and how these were treated. The document focuses on three ethical issues: Processing of personal data, discovery of incidental findings and misuse of research findings which were highlighted in (Deliverable 1.10, 2019).
Recent studies report that cybersecurity breaches noticed in hospitals are associated with low le... more Recent studies report that cybersecurity breaches noticed in hospitals are associated with low levels of personnel’s cybersecurity awareness. This work aims to assess the cybersecurity culture in healthcare institutions from middle- to low-income EU countries. The evaluation process was designed and performed via anonymous online surveys targeting individually ICT (internet and communication technology) departments and healthcare professionals. The study was conducted in 2019 for a health region in Greece, with a significant number of hospitals and health centers, a large hospital in Portugal, and a medical clinic in Romania, with 53.6% and 6.71% response rates for the ICT and healthcare professionals, respectively. Its findings indicate the necessity of establishing individual cybersecurity departments to monitor assets and attitudes while underlying the importance of continuous security awareness training programs. The analysis of our results assists in comprehending the counterme...
Proceedings of the International Conferences on ICT, Society and Human Beings (ICT 2020), Connected Smart Cities (CSC 2020) and Web Based Communities and Social Media (WBC 2020), 2020
The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent r... more The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the concurrent reality. Its consequences vary from political and societal to technical and economic. These side effects provided fertile ground for a noticeable cyber-crime increase targeting critical infrastructures and, more specifically, the health sector; the domain suffering the most during the pandemic. This paper aims to assess the cybersecurity culture readiness of hospitals’ workforce during the COVID-19 crisis. Towards that end, a cybersecurity awareness webinar was held in December 2020 targeting Greek Healthcare Institutions. Concepts of cybersecurity policies, standards, best practices, and solutions were addressed. Its effectiveness was evaluated via a two-step procedure. Firstly, an anonymous questionnaire was distributed at the end of the webinar and voluntarily answered by attendees to assess the comprehension level of the presented cybersecurity aspects. Secondly, a post-evaluation phi...
The Sphinx project aims to provide a Universal Cyber Security Toolkit for the Health and Care Dom... more The Sphinx project aims to provide a Universal Cyber Security Toolkit for the Health and Care Domain. This deliverable outlines the basic steps for the implementation of the information security strategy within health sector. Provided that Sphinx R&D activities should comply with established practices as well as the legal framework for ethical, privacy and data protection issues, the deliverable identifies restrictions and provides guidelines in relation to privacy and data protection as well as access to personal information. The goal is to ensure that the project methods, tools, technologies and processes will be able to be adopted without any legal barrier at least as this concerns the national (three pilots) and the European legal and ethical framework and mainly the GDPR.
Citizen sensing applications need to have a number of users defined that ensures their effectiven... more Citizen sensing applications need to have a number of users defined that ensures their effectiveness. This is not a straightforward task because neither the relationship between the size of the userbase or its effectiveness is easily quantified, nor is it clear which threshold for the number of users would make the application ‘effective’. This paper presents an approach for estimating the number of users needed for location-based crowdsourcing applications to work successfully, depending on the use case, the circumstances, and the criteria of success. It circumvents various issues, ethical or practical, in performing real-world controlled experiments and tackles this challenge by developing an agent-based modelling and simulation framework. This framework is tested on a specific scenario, that of missing children and the search for them. The search is performed with the contribution of citizens being made aware of the disappearance through a mobile application. The result produces ...
Uploads
Papers by Christos Ntanos