- Home
- Single Events
- Browse by Date
Single Events
Publications from single events related to EUSSET.
Browsing Single Events by Issue Date
1 - 20 of 21
Results Per Page
Sort Options
- Text DocumentBeyond Game Design for Broadening Participation: Building New Clubhouses of Computing for Girls(GenderIT 2014, 2014) Kafai, Yasmin B.; Burke, QuinnThe absence of women in IT has been a vexing issue for over two decades. Most attempts to broaden participation in computing have focused on “unlocking the clubhouse” to a more diverse group of participants. One popular approach has been to ask girls to program games, which developed into the Game Design Movement, a series of studies and tools to help develop and empower females as designers of interactive digital media. This paper examines the rationales and successes behind the Game Design Movement in order to outline new strategies for broadening participation in computing. Rather than simply “unlocking the clubhouses” through expanded game-making activities, we argue here that educators and researchers should devote themselves to “building new clubhouses” altogether by focusing on using new programmable materials, interactive activities, and both in-person and online communities that leverage the traditions of girls’ play worlds and the cultural practices of women’s crafting communities.
- Text DocumentA Rail of One’s Own” – Creating Spaces for Women in IT(GenderIT 2014, 2014) Laugwitz, Laura LindaVolunteer-based programs such as the Rails Girls project are recruiting people from within the field of information technology (IT) to help change the ratio of men and women in programming. By offering free coding workshops for women without any prior experience, the Rails Girls project is challenging hegemonic notions of technology as difficult to master. Rails Girls has chapters all over the world and is quite popular within the Ruby / Ruby on Rails community. This paper gives insight into the workings of Rails Girls Berlin, analyzes how spaces for women in IT are created and which processes of inclusion and exclusion need to be considered when trying to create an empowering experience.
- Text DocumentSelf-defence IT – Migrant Women and ICTs Strategies(GenderIT 2014, 2014) Gouma, Assimina; Ernst, Waltraud; Carrington, Kim; Caixeta, LuzenirInformation- and Communications Technologies (ICTs) are central in everyday life in (post-) industrial societies. However, the conditions of their availability and the practicalities relating to their use vary greatly: ICTs users focus on different social issues using “new media” and (re)produce power dynamics in different ways. From this perspective, ICTs are systems with complex inclusionary and exclusionary mechanisms that run along intersections of class, gender, race, age etc. The paper analyses the results of the research project Selfdefence IT. Self-defence IT is an action research project initiated by the migrant women organisation maiz. Therein, women with migration biographies formulate a series of concerns in relation to ICTs that are relevant for both private and public spheres. It shows that the experience of migration changes and influences the way ICTs are used. Depending on context, ICTs may function as instruments to transcend national and social boundaries, as a platform for social control or as an opportunity for mobility in training and work.
- Text DocumentBarke - Gender all around! A practical and holistic approach towards recruiting and retaining women in the field of IT(GenderIT 2014, 2014) Barke, Helena; Siegeris, Juliane; Nordmann, StefanieIs a women-only degree program an effective way to provide a path for women into attractive carriers in the field of IT? This paper presents different ways, how the University of Applied Sciences HTW Berlin attempts to recruit, support and retain women for STEM (Science, Technology, Engineering and Mathematics). The focus is on the mono-educative degree program 'Informatik und Wirtschaft' (computer science and business administration) and its gender-oriented curriculum. The degree program is one part of a three-phase-support-model to attract women for STEM in general. This support-model and the linkage with the degree program will be explained. Finally we present as one first indication of success, the diversity of the reached student group.
- Text DocumentThe Impact of IT Intervention Programs for Girls(GenderIT 2014, 2014) Coldwell-Neilson, Jo; Craig, Annemieke; Gorbacheva, Elena; Beekhuyzen, JenineThe goal of our study is to investigate the longitudinal effects of one intervention program for schoolgirls in the Information Technology (IT) field. This bi-annual event has been conducted regularly since 2006 with the aim of confronting a decline in the interest among girls to study IT and promoting study and work opportunities in the field. Each event has been evaluated with pre- and post-event surveys. Longitudinally, both students and teachers have also been surveyed three to four years after the event in which they participated. Results from the 2006 cohort surveyed in 2009-2010 are reported on in this paper. The main conclusion is that, unfortunately, any increase in the uptake of IT in schools that occurred as a result of attending the event was transitory. Therefore, it is crucial that inspiring, engaging, and empowering computing classes are being offered continuously at all secondary schools.
- Text DocumentWomen and their Work–Life Balance in German IT Consulting(GenderIT 2014, 2014) Nissen, Volker; Termer, FrankGermany’s current population pyramid – as well as certain gender aspects – has led to a call for increasing numbers of working women in many industrial sectors. However, IT consultancies still find it difficult to adequately exploit highly qualified women’s potential when recruiting and bonding them. We believe that this originates from deficits in the perceived work–life balance of female consultants. Therefore, on the basis of an empirical study carried out with the aid of online interviews and following expert phone interviews, the current state of work–life balance in German IT consultancies is looked at in this paper. We focus on the situation of female IT consultants and show that the consulting sector can improve the work–life balance of female IT consultants by means of additional efforts, and also by raising the attractiveness of this sector for entrants.
- Text DocumentBeyond “Pink” and “Blue”: Gendered Attitudes towards Robots in Society(GenderIT 2014, 2014) Wang, Yan; Young, James E.Developing an improved understanding and awareness of how gender impacts perceptions of robots and interactions with them is crucial for the ongoing advancement of the human-robot interaction (HRI) field, as a lack of awareness of gender issues increases the risk of robot rejection and poor performance. This paper provides a theoretical grounding for gender-studies in HRI that illustrates potential dangers of “pink” versus “blue” dichotomous over-simplifications of women and men, and advocates for including potential users of both sexes. We further present the results from an exploratory survey of women and men’s attitudes toward robot development that demonstrates how real-world gender differences on attitudes toward robots go beyond simplistic generalizations. We envision that this work will provide HRI designers with a foundation and exemplary account of how gender can influence attitudes toward and interaction with robots, serving as a resource and a sensitizing discussion for gender studies in HRI.
- Text DocumentAttributions in HCI: A Gendered View(GenderIT 2014, 2014) Janneck, Monique; Guczka, Sascha R.; Niels, AdelkaIn two pilot studies we measured computer-related attribution styles, i.e. the systematic ascription of causes to effects in situations of failure or success, identifying a typology of nine specific attribution styles [6]. In this paper we briefly summarize results and take a specific look at gender differences regarding attribution patterns in situations of failure and success when using computers.
- Text DocumentMy Reputation in the Web! Self-(re-)presentation and image management of female and male youngsters in Facebook(GenderIT 2014, 2014) Knoll, Bente; Fitz, BernadetteThe use of Web 2.0-technologies goes hand-in-hand with a users' public image. Today, youngsters especially have to face the challenge of balancing between protecting their privacy and updating as well as maintaining one's online image. This research paper titled "My Reputation in the Web" focuses on the online-identity management and image repertoire of male and female youngsters using Facebook. An intention of the research was to identify the different requirements, living conditions and living realities of young male and female web-2.0-users. Furthermore, a special aspect of this research is the focus given to acquire knowledge of the target-group concerning their safety and privacy in the social web. The survey, designed as actionorientated workshops, was carried out at five schools in Austria in February and June 2013. Based on the results of this empirical study, concrete tools and guidelines for teachers and trainers, such as a handbook and a train-thetrainer-E-learning course, will be developed by the end of September 2014.
- Text DocumentAgony of Choice? Webforms for Selecting Titles(GenderIT 2014, 2014) Marsden, NicolaEliciting information to formally address a user on a family-name basis is an aspect of user interface design that is inevitably connected to the issue of gender. In most cases an appropriate salutation includes information about the addressee's sex, i.e. it requires the designer to make decisions about how to present this information. Results from a survey of how webforms for selecting titles are designed are presented, showing a binary approach to gender, a tendency for the male title ("Herr") to be the given default, and offering several starting points for discussion on user experience of webforms, sex and gender.
- Text DocumentSupporting Appropriation Work: A Workshop Report(2015) Dittrich, Yvonne; Dourish, Paul; Morch, Anders; Pipek, Volkmar; Stevens, Gunnar; Toerpel, Bettina
- Conference PaperEngineering sustainable blockchain applications(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Osterland, Thomas; Rose, ThomasBlockchain technology has attracted attention as emerging paradigm for business collaboration. Blockchain’s consensus mechanisms allow partners to cooperate in a business network. However, many applications reported in literature present merely a proof of concept from an engineering perspective. An industrialization of blockchain requires an engineering framework, which assures the sustainability of the application and in particular its network partnerships, i.e. each participant has to act as an active peer in the network rather than being a mere consumer with a wallet for participation in the blockchain. This paper presents the skeleton of such an engineering framework starting with an ideation of partnerships and collaboration patterns to clarify the incentives for participation via business model design for sustainable network operations towards the selection of an implementation platform for the business processes re-engineered. Moreover, an initial version of an interactive tool for community-oriented capturing of know-how about characteristics of blockchain platforms is presented.
- Conference PaperPrivacy-preserving KYC on Ethereum(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Biryukov, Alex; Khovratovich, Dmitry; Tikhomirov, SergeiIdentity is a fundamental concept for the financial industry. In order to comply with regulation, financial institutions must verify the identity of their customers. Identities are currently handled in a centralized way, which diminishes users' control over their personal information and threats their privacy. Blockchain systems, especially those with support for smart contracts (e.g., Ethereum), are expected to serve as a basis of more decentralized systems for digital identity management. We propose a design of a privacy-preserving KYC scheme on top of Ethereum. It would let providers of financial services leverage the potential of blockchain technology to increase effciency of customer onboarding while complying with regulation and protecting users' privacy.
- Conference PaperTRADE: A Transparent, Decentralized Traceability System for the Supply Chain(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) El Maouchi, Mourad; Ersoy, O˘guzhan; Erkin, ZekeriyaTraceability has become an increasingly important aspect of the supply chain in the last few years due to customer awareness as well as better planning and problem identification. Unfortunately, technological, legal, and organizational concerns limit the possibility to utilize a centralized system to achieve traceability. Trust is one of the most important factors preventing the appliance of a centralized system. Previous works provided several approaches to create a decentralized traceability system. However, these works do not state the feasibility of their work and its appliance for the supply chain. In this paper, we propose a fully transparent and decentralized traceability system for the supply chain, namely TRADE. The system leverages the actors and supply chain structure to achieve traceability. Moreover, consumers and other parties can view all the data in the system and verify the claims of actors on the products. The latter results in positive brand reputation and auditability.
- Conference PaperA Use Case Identification Framework and Use Case Canvas for identifying and exploring relevant Blockchain opportunities(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Klein, Sandra; Prinz, WolfgangBlockchain is a new, foundational technology with a vast amount of application possibilities. However, practitioners might not be aware of which use cases in their own business model might benefit from blockchain technology. To aid them in analyzing their business regarding blockchain suitability, this paper introduces a use case identification framework for blockchain and a use case canvas. In the development process they have been evaluated with internal and external reviews in order to offer the best possible guidance. In combination they offer an analysis framework to help practitioners decide which use cases they should take into account for blockchain technology, which characteristics these blockchain implementations would have, and which specific advantages they would offer.
- Conference PaperPrivacy by BlockChain Design: A BlockChain-enabled GDPR-compliant Approach for Handling Personal Data(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Wirth, Christian; Kolain, MichaelThis paper takes an initial step forward in bringing to life the certification mechanisms according to Art. 42 of the General Data Protection Regulation (GDPR). These newly established methods of legal specification act not only as a central vehicle for overcoming widely articulated and discussed legal challenges, but also as a sandbox for the much needed close collaboration between computer sciences and legal studies. In order to illustrate, for example, what data protection seals could look like in the future, the authors propose a methodology for "translating" legal requirements into technical guidelines: architectural blueprints designed using legal requirements. The purpose of these blueprints is to show developers how their solutions might comply with the principle of Privacy by Design (Art. 25 GDPR). To demonstrate this methodology, the authors propose an architectural blueprint that embodies the legal concept of the data subject’s consent (Art. 6 sec. 1 lit. a GDPR) and elevates best practice to a high standard of Privacy by Design. Finally, the authors highlight further legal problems concerning blockchain technology under the GDPR that will have to be addressed in order to achieve a comprehensive certification mechanism for Privacy by Blockchain Design in the future.
- Conference PaperDEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Vos, Daniel; Overweel, Leon; Raateland, Wouter; Vos, Jelle; Bijman, Matthijs; Pigmans, Max; Erkin, ZekeriyaMillions of shipping containers filled with goods move around the world every day. Before such a container may enter a trade bloc, the customs agency of the goods’ destination country must ensure that it does not contain illegal or mislabeled goods. Due to the high volume of containers, customs agencies make a selection of containers to audit through a risk analysis procedure. Customs agencies perform risk analysis using data sourced from a centralized system that is potentially vulnerable to manipulation and malpractice. Therefore we propose an alternative: DEFenD, a decentralized system that stores data about goods and containers in a secure and privacy-preserving manner. In our system, economic operators make claims to the network about goods they insert into or remove from containers, and encrypt these claims so that they can only be read by the destination country’s customs agency. Economic operators also make unencrypted claims about containers with which they interact. Unencrypted claims can be validated by the entire network of customs agencies. Our key contribution is a data partitioning scheme and several protocols that enable such a system to utilize blockchain and its powerful validation principle, while also preserving the privacy of the involved economic operators. Using our protocol, customs agencies can improve their risk analysis and economic operators can get through customs with less delay. We also present a reference implementation built with Hyperledger Fabric and analyze to what extent our implementation meets the requirements in terms of privacy-preservation, security, scalability, and decentralization.
- Conference PaperDeveloping an Evaluation Framework for Blockchain in the Public Sector: The Example of the German Asylum Process(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Fridgen, Gilbert; Guggenmoos, Florian; Lockl, Jannik; Rieger, Alexander; Schweizer, AndreThe public sector presents several promising applications for blockchain technology. Global organizations and innovative ministries in countries such as Dubai, Sweden, Finland, the Netherlands, and Germany have recognized these potentials and have initiated projects to evaluate the adoption of blockchain technology. As these projects can have a far-reaching impact on crucial government services and processes, they should involve a particularly thorough evaluation. In this paper, we provide insights into the development of a framework to support such an evaluation for the German asylum process. We built this framework evolutionarily together with the Federal Office for Migration and Refugees. Its final version consists of three levels and eighteen categories of evaluation criteria across the technical, functional and legal domains and allows specifying use-case specific key performance indicators or knockout criteria.
- Conference PaperBlockchain for Education: Lifelong Learning Passport(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Gräther, Wolfgang; Kolvenbach, Sabine; Ruland, Rudolf; Schütte, Julian; Torres, Christof; Wendland, FlorianCertificates play an important role in education and in professional development in companies. Individual learning records become essential for people’s professional careers. It is therefore important that these records are stored in long-term available and tamper-proof ledgers. A blockchain records transactions in a verifiable and permanent way, therefore it is very suitable to store fingerprints of certificates or other educational items. Blockchain reveals forgery of certificates and it supports learning histories. In this paper, we present the Blockchain for Education platform as a practical solution for issuing, validating and sharing of certificates. At first, we describe the conceptual system overview and then we present in detail the platform implementation including management of certification authorities and certificates, smart contracts as well as services for certifiers, learners and third parties such as employers. Finally, we describe use cases and first evaluation results that we gathered from end user tests with certifiers and conclude with a discussion.
- Conference PaperOn Immutability of Blockchains(Proceedings of 1st ERCIM Blockchain Workshop 2018, 2018) Landerreche, Esteban; Stevens, MarcRecently we presented a single-party cryptographic timestamping mechanism based on proof-of-sequential-work, which we proved secure in the universal composability framework [16]. This paper describes this construction and its security claims and uses it to construct a multi-party permissioned blockchain protocol and show that it achieves an immutability notion. Finally we discuss applications of this protocol, including unpermissioned blockchains, and how these may benefit.