Jerry S. Busby

Learn More
Classification Red – highly sensitive information, limited access for: Yellow – restricted limited access for: Green – restricted to consortium members White – Public Internal reviewer(s) Abstract Understanding the risks associated with using cloud computing is of paramount importance for operators of high-assurance ICT services, such as critical(More)
Industrial health and safety is an important yet largely unexplored application area of ubiquitous computing. In this paper we investigate the relationship between technology and organization in the context of a concrete industrial health and safety system. The system is designed to reduce the number of incidents of " vibration white finger " (VWF) at(More)
SUMMARY The need to integrate the operation of computer applications is becoming an increasingly prominent issue in industrial firms. Mechanisms have to be developed to allow these systems to share the information they generate and use—to ensure that elements of data with a common meaning, in different systems, have consistent values. The applications are(More)
Ubiquitous computing is a new kind of computing where devices enhance everyday artefacts and open up previously inaccessible situations for data capture. 'Technology paternalism' has been suggested by Spiekermann and Pallas (Poiesis & Praxis: Int J Technol Assess Ethics Sci 4(1):6–18, 2006) as a concept to gauge the social and ethical impact of these new(More)
Individuals often use information from broadcast news (e.g. media) and narrowcast news (e.g. personal social network) to form their perception on a certain social issue. Using a case study in social risk amplification, this paper demonstrates that simulation modelling, specifically agent-based simulation, can be useful in analysing the effect of broadcast(More)
Focusing on technical security can lead to shortfalls in the understanding of social and organisational security challenges. This paper proposes a method for analysing social, technical, and organisational security challenges, in regard to industrial control systems (ICS). This method is applied to a target organisation dependent on ICS, to validate the(More)