{"id":25826,"date":"2024-04-22T11:23:22","date_gmt":"2024-04-22T09:23:22","guid":{"rendered":"https:\/\/nr.no\/en\/?post_type=bc_project&#038;p=25826"},"modified":"2024-04-23T09:26:54","modified_gmt":"2024-04-23T07:26:54","slug":"utrustit","status":"publish","type":"bc_project","link":"https:\/\/nr.no\/en\/projects\/utrustit\/","title":{"rendered":"Can we trust in Internet of Things?"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>In the future, it will be common for devices to communicate with each other or connect to the Internet. This development, known as the &#8220;Internet of Things,&#8221; promises to simplify life and integrate services smoothly. <\/strong><\/p>\n\n\n\n<p>However, it also poses privacy and trust concerns regarding interactions with numerous devices. Questions arise such as whether you can trust the devices your own devices communicate with, what type of information they are seeking, and how they will use the information they collect. How can you safeguard your privacy and data? <\/p>\n\n\n\n<p>The uTRUSTit project aims to address these questions and develop guidelines and systems to help everyone, regardless of their skills, to assess the trustworthiness of surrounding devices. uTRUSTit focuses on enhancing security, privacy, trust, universal design, usability, and accessibility.<\/p>\n\n\n\n<p><strong>Contribution from the Norwegian Computing Center<\/strong><br>The Norwegian Computing Center will be involved in several aspects of the project. Our primary goal is to define the requirements for uTRUSTit. We will outline the user scenarios and personas to guide the development and testing of prototypes. We are particularly focused on addressing accessibility for individuals with special needs and incorporating these considerations into our requirements. Additionally, we will help in developing mental models for trust, assist in user evaluations of prototypes, and define how devices can communicate their security and privacy statuses. Other roles include providing technical support, drafting design guidelines, and serving as the ethics officer for the project.<\/p>\n\n\n\n<p><strong>Benefits for Customers<\/strong><br>The European Commission will gain valuable insights into establishing a trustworthy information and communication technology infrastructure. The prototypes, incorporating advanced technologies like Near Field Communication (NFC), biophysical sensors, Virtual Reality (VR), and 3D technology, will provide critical information on how future devices should be designed. The design guidelines developed will help designers and engineers create devices that can easily present security and privacy information to users.<\/p>\n\n\n\n<p><strong>Benefits for Society<\/strong><br>Users will benefit from devices that help them decide what information they are comfortable sharing and with whom, including which devices and services. These devices will also inform users about other devices in the vicinity that are requesting information. By incorporating the needs of people with disabilities into our requirements, the guidelines and prototypes will be accessible to a broader segment of the population, enhancing inclusivity.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\t\t<div id=\"post-type-multi-block_aa868a05fc2d86251c7c5bb521211400\" class=\"wp-block-post-type-multi type-manual style-card-bc_employee t2-grid\">\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-12\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.no\/en\/employees\/kristin-skeide-fuglerud\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2024\/05\/kristin-skeide-fuglerud-15.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Kristin Skeide Fuglerud<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Chief Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"t2-grid-item-col-12\">\n\t\t\t\t\t\t<a href=\"https:\/\/nr.no\/en\/employees\/trenton-schulz\/\" class='card-employee'>\n\t\t\t\t\t<figure>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nr.no\/content\/uploads\/sites\/2\/2024\/05\/trenton-schulz-11.jpg\" alt=\"\">\n\t\t\t<\/figure>\n\t\t\t\t<div class=\"card-employee__content\">\n\t\t\t<p class=\"card-employee__name\">Trenton Schulz<\/p>\n\t\t\t\t\t\t\t<p class=\"card-employee__position\">Senior Research Scientist<\/p>\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" height=\"24\" width=\"24\" class=\"t2-icon t2-icon-arrowforward\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.9 4.259a1.438 1.438 0 0 1-.147.037c-.139.031-.339.201-.421.359-.084.161-.084.529-.001.685.035.066 1.361 1.416 2.947 3l2.882 2.88-10.19.02c-8.543.017-10.206.029-10.29.075-.282.155-.413.372-.413.685 0 .313.131.53.413.685.084.046 1.747.058 10.29.075l10.19.02-2.882 2.88c-1.586 1.584-2.912 2.934-2.947 3-.077.145-.085.521-.013.66a.849.849 0 0 0 .342.35c.156.082.526.081.68-.001.066-.035 1.735-1.681 3.709-3.656 2.526-2.53 3.606-3.637 3.65-3.742A.892.892 0 0 0 23.76 12a.892.892 0 0 0-.061-.271c-.044-.105-1.124-1.212-3.65-3.742-1.974-1.975-3.634-3.616-3.689-3.645-.105-.055-.392-.107-.46-.083\"\/><\/svg>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\n<div class=\"wp-block-group has-primary-200-background-color has-background\">\n<p>Project: uTRUSTit &#8211; Usable TRUST in the Internet of Things<\/p>\n\n\n\n<p>Partners: Chemnitz University of Technology, Center for Usability Research and Engineering, Search-Lab \u2015 Security Evaluation Analysis and Research Laboratory, Ltd, Katholieke Universiteit Leuven, Sweden Connectivity AB <\/p>\n\n\n\n<p>Period: 2010 &#8211; 2013<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":29950,"template":"","meta":{"_acf_changed":false,"_trash_the_other_posts":false,"editor_notices":[],"footnotes":""},"class_list":["post-25826","bc_project","type-bc_project","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/25826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project"}],"about":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/types\/bc_project"}],"version-history":[{"count":4,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/25826\/revisions"}],"predecessor-version":[{"id":29949,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/bc_project\/25826\/revisions\/29949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media\/29950"}],"wp:attachment":[{"href":"https:\/\/nr.no\/en\/wp-json\/wp\/v2\/media?parent=25826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}