About
108
Publications
17,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
849
Citations
Introduction
Docent, Dr Eleni Berki (eleni.e.berki@jyu.fi) is Adjunct Professor of Software Quality and Formal Modelling at the Faculty of Information Technology, University of Jyväskylä, Finland. Previously she worked as a Senior Research Fellow at the University of Tampere. Eleni's research and teaching interests are in Cybersecurity, Formal Metamodelling, Process Improvement, Free/Open Source SW, Theory of Computation and SW Engineering. She is interested in the concept of 'learnability' as it arises in diverse domains such as tools design, deep learning environments, artificial intelligence and socio-cognitive spaces. She has supervised and examined many MSc and PhD theses and co-authored more than 150 international publications including journal/conference papers, industrial reports and other.
Publications
Publications (108)
Migrating the teaching and learning activities to the Internet invites a plethora of cyber risks and security threats. As distance learning has undergone a spectacular development and use recently, especially in the Covid-19 era-when it was, once, only temporarily established-, it is considered of utmost importance to ensure the issue of security a...
The abrupt outbreak of the coronavirus pandemic throughout the world in March 2020 resulted in the sudden closure of all schools, colleges and universities, institutions, and an unprecedented pivot to remote learning. Students and teachers were confronted with the
the overwhelming challenge of migrating from the traditional face-to-face or hybrid m...
The SPI Manifesto provides a framework for guiding software development organisations in their improvement efforts. Based on the Values of People, Business and Change, which are supported and informed by one or more of the ten principles, the designer and developer can avoid pitfalls, minimise risks and make their business successful. It has been e...
Over a decade has passed since the inception of the SPI Manifesto. The fact that the signatories of the manifesto emanate from both the academic and the industrial communities enables a robust exchange of ideas and experiences. Continuous enrichment and refinement have been evidenced in publications, industrial projects, and consultancy across both...
Industry 4.0 is universally referred to as the fourth industrial revolution. It is a current trend of automation and data exchange in manufacturing technologies. The computerisation of manufacturing includes, amongst other, cyber-physical systems, the Internet of Things (IoT), cloud computing and cognitive computing. There are many challenges in th...
Deep and meaningful learning (DML) in distant education should be an essential outcome of quality education. In this literature review, we focus on e-learning effectiveness along with the factors and conditions leading to DML when using social virtual reality environments (SVREs) in distance mode higher education (HE). Hence, a systematic literatur...
The social disruption caused by the sudden eruption of the Corona Virus pandemic has shaken the whole world, influencing all levels of education immensely. Notwithstanding there was a lack of preparedness for this global public health emergency which continues to affect all aspects of work and life. The problem is, naturally, multifaceted, fast evo...
Power point presentation at the INSPIRE Conference in London in 2020 named
Challenges of Rapid Migration to Fully Virtual Education in the age of the Coronavirus pandemic�
Experiences from across the world�by 34 co-authors from 14 countries
A great experience from 14 countries from all over the world.
The Software Process Improvement (SPI) Manifesto is based on three basic values: people, business focus and organisational change underpinning the philosophy of SPI. In turn, these values bring up to date certain SPI principles serving as a foundation for action in software development. The authors of this paper carried out a pilot expert validatio...
Measuring viewers’ experiences of films has become a critical issue for filmmakers because all kinds of audiences now have access to new releases from all over the world. Some approaches have focused on the cognitive level of the experience, while others have emphasized the structure of films. Additionally, some have used quantitative objective met...
Software Process Improvement (SPI) has been founded on the belief that a well-defined and executed process is likely to produce a high-quality pro-duct. Improving a product might provide insights for future improvement efforts. However, this bottom-up approach does not necessarily lead to improvement, considering in particular that software product...
A password manager stores and handles users’ passwords from different services. This relieves the users from constantly remembering and recalling many different login credentials. However, because of the poor usability and limited user experience of password managers, users find it difficult to perform basic actions, such as a safe login. Unavoidab...
Lifelong learning is currently being embraced as a central process that could disrupt traditional educational paths. Apparently, the (ideal) type of learning often promoted is deep and meaningful learning, though it is not always required to be so. Deep learning goes beyond superficial knowledge assimilation of unlinked facts; it aims at developing...
A positive image would inspire the capable but underrepresented who might otherwise give up on computing.
Deeper learning and conceptual understanding are essential and critical elements for achieving learning process improvement in Computational Thinking (CT) curricula. For successful learning outcomes the school teachers of programming most probably have to familiarise themselves with two essential learning frameworks: i) tangible programming interfa...
The University of Patras' Library Services designed and offered to primary and secondary schools the pilot educational program “From the Ancient to the Modern Tablets”, featuring immersive multimedia learning experiences about the book history. The pilot program consisted of three stages: a playful library tour, followed by an interactive game-base...
The utilization of Technology Enhanced Learning and more specifically of Distance Education for Life-Long Learning and Continuous Professional Development are at the epicenter/focus of European policies for the improvement of the delivery of Vocational Education and Training. In this context, one of the important challenges is the design of versati...
The University of Patras' Library Services designed and offered to primary and secondary schools the pilot educational program "From the Ancient to the Modern Tablets", featuring immersive multimedia learning experiences about the book history. The pilot program consisted of three stages: A playful library tour, followed by an interactive game-base...
Cybersecurity professionals face increased demand to acquire the knowledge and develop the skills required to keep citizens safe from cyberattacks, predict the latter with scientific methods, and advance citizens' social awareness. A proactive multidisciplinary approach against cyberattacks is effective via the combination of multidisciplinary and...
We propose a novel hierarchical sliding slice regression which in a coarse-to-fine manner represents global circular target space with a number of ordinally localized and overlapping subspaces. Our method is particularly suitable for visual regression problems where the regression target is circular (e.g., car viewing angle) and visual similarity i...
Women’s under-representation in the fields of science and technology is strong; both in software houses and academic posts. We focus on the academic field by gender sensitive analysis of Information and Communication Technology (ICT) academics. The general picture given by statistics’ meta-analyses illustrates male dominance even in Finland, which...
Open Education (OE) is a distance learning approach that was strategically chosen by the European Commission (EC) to encourage cost-effective training, upskilling and reskilling of large population groups and workforce with speed and flexibility. Institutions and businesses design and offer Open Online Courses (OOCs) to address skill gaps, organiza...
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past. However, it has been increasingly difficult to stop more recent and sophisticated social phishing attacks. To protect the citizens from new types of phishing...
Individuals and organizations utilize the cloud technology and its services in various ways. Cloud-based services are becoming increasingly popular, while there is no adequate knowledge offered for their secure use in the education for future IT professionals. It is important to understand how security and privacy issues are perceived and handled b...
Open standardization seems to be very popular among software developers as it simplifies the standard’s adoption by the software engineering. Formal specification methods, while very promising, are being adopted slowly as the industry seems to have little motivation to move into this territory. In this paper the authors present (1) the idea of appl...
Social virtual reality environments, also known as 3D virtual immersive environments, are three-dimensional computer-generated virtual spaces that are increasingly used in attendance-based and distance education. Thanks to their unique characteristics that separate them from two-dimensional virtual learning environments, social virtual reality envi...
*Password manager is an application handling and storing users’ passwords from different services. *Password manager aims to relieve the users from constantly remembering and recalling their login credentials. *Though the program is designed to help users in password management, users often encounter difficulties to perform even such basic actions...
Although there are three stemmers published for the Greek language, only the one presented in this paper and called Ntais' stemmer is freely open and available, together with its enhancements and extensions according to Saroukos' algorithm. The primary algorithm (Ntais' algorithm) uses only capital letters and works with better performance than oth...
The main aim of this pilot study is to investigate management anti-patterns encountered in IT innovation projects, in the long run. A quantitative research methodology was chosen. A group of software project managers in industrial innovation projects were requested to fill in a questionnaire. The collected data revealed anti-patterns, which were co...
Preparing students adequately against online-attacks is a constant teaching and learning challenge, no matter how many advanced security-related courses have been developed for higher education curricula worldwide. Recently emphasis has also been put on online identity theft and social awareness in general. The authors research the knowledge, skill...
Social engineering is the most prevalent scheme used for online attacks and identity theft. This is the reason why security-related courses, modular degree schemes and training have recently been increased in education and industry worldwide. Emphasis is put on certain subjects such as online identity theft (or phishing) and social awareness. In th...
Key2phone is a mobile access solution which turns mobile phone into
a key for electronic locks, doors and gates. In this paper, we elicit and analyse
the essential and necessary safety and security requirements that need to be
considered for the Key2phone interaction system. The paper elaborates on
suggestions/solutions for the realisation of s...
Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing
public readiness can be a strategic protection mechanism for citizens’ vulnerability and privacy. Further, an
effective research strategy against phishing is the combination of increased social awareness with software
quality and social com...
The increasing number of Internet and mobile phone
users, and essentially those, who use these electronic media to
perform online transactions makes Nepal lucrative for phishing
attacks. It is one of the reasons behind escalating phishing attacks in
the country. Therefore, in this paper we examine various phishing
attempts and real scenarios i...
Europe has the opportunity to utilize Open Education to train specialized workforce and boost employment by increasing MOOC quantity, speeding-up MOOC delivery and improving MOOC quality. Authors propose a crowd-sourced open mechanism called MOOCAgora for the innovative design and agile development of qMOOCs. MOOCAgora is the heart of an 8-stage bu...
Content: It contains some fundamental issues which have to be addressed in order to make ambient intelligence applications in smart buildings more usable and to gain acceptance from people.
The report presents the crucial factors which have to be considered when determining an optimization approach for sensor arrangement. Furthermore, it briefly i...
In web browsers, a variety of anti-phishing tools and technologies are available to assist users to identify phishing attempts and potentially harmful pages. Such anti-phishing tools and technologies provide Internet users with essential information, such as warnings of spoofed pages. To determine how well users are able to recognise and identify p...
Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into t...
The recommendation of the Digital Agenda Assembly 2012 to address the development of suitable socio-technical skills and expertise through open education and MOOCs in order to decrease unemployment in Europe faces three challenges: a) increase MOOC quantity, b) speed-up MOOC delivery and c) improve MOOC quality. The paper argues that a crowd-source...
One cannot be a problem solver without deep understanding of what constitutes a problem. Failing to recognise and define problems presents obstacles in constructing and applying knowledge in problem solving. This has been the motivation for the authors to re-examine in the context of IT (Information Technology) the concept, nature and types of a pr...
Content: This is a preliminary report. It contains some fundamental issues which have to be addressed in order to make ambient intelligence environment more usable and to gain acceptance from people.
Essentially, it presents the crucial factors which have to be considered when determining an optimization approach for sensor arrangement. Furthermor...
Content: This report explains: mechanism that can be used for the copyright protection of
video content; privacy and security requirements for Interactive 360 degree panorama video player
when it is used for live streaming entertainment shows like sports, reality shows, and music
concerts; platforms for sharing 360 degree videos and mechanisms t...
This booklet was published by the International Bureau of Education (UNESCO) in collaboration with the International Academy of Education (IAE), in the Educational Practices Series (no 25). The booklets published in Educational Practice Series describe in a simple language some eight to twelve universally applicable principles for a specific topic,...
Software quality assurance and ‘dark’ social engineering seem to
currently constitute a rather ‘closed-case’ body of scientific knowledge.
Specific information and software quality criteria on corrective and
reactive (not pro-active or preventive!) maintenance are shared by a few
research groups and a small number of anti-phishing technology
compan...
Electronic health records implementation has been a challenge for many governments worldwide, who have tried to realise a quality and cost-effective implementation through closed and/or open source software. The paper discusses the background and rationale for implementing health records through an open source software development process model. Wh...
Social media and online communities offer increased possibilities for connection, interaction and participation but also new media with tools for self-presentation and identity management. Interacting anonymously or eponymously, having one, none or many identities online expresses richness in online communication. Contentious identities for communi...
This paper deals with the learning re-design of a course in Open Source and Software Quality. The instructors utilised concepts of problem-focused education; without, though, strictly following the principles as defined in the classic application of the approach. The course participants worked either in teams or alone, while emphasis was put on the...
This paper deals with the learning re-design of a course in Open Source and Software Quality. The instructors utilised concepts of problem-focused education; without, though, strictly following the principles as defined in the classic application of the approach. The course participants worked either in teams or alone, while emphasis was put on the...
Many anti-phishing solutions turn to be ineffective because they
have poor usability. There have been significant improvements when
usability and phishing detection techniques are handled separately.
However, handling usability in anti-phishing solutions still remains a
challenging task. This is because considering usability for antiphishing so...
This management summary comments on the early outcomes of an
R&D project with industrial and academic collaboration. In
particular, the project’s requirements elicitation phase is presented,
during which the authors determined the security and usability
requirements of different use-cases for the Interactive 360
0
panorama video player. The use...
Content: The report explains the security and usability requirements proposed by our team
for the different use-cases of Interactive 360 degree panorama video player.
Impact: This document contains the outcomes of requirements elicitation that our team
conducted in order to determine the security and usability requirements of different use-cases...
Higher education (HE) has not efficiently targeted a knowledge-shaped economy and has not kept up with the knowledge and IT skills demanded to resolve the problems from social- and work- exclusion. While recently unemployed knowledge workers are searching for new jobs, re-educating policies and career development options have not kept pace with wor...
Content: The report explains the security and usability policies proposed by our team for the
Key2phone system.
Impact: This report contains the source code in Finite State Process (FSP), which explains the
security and usability policies in the Key2phone system proposed by our team. Further, the
report also points out some security challenges...
Anti-phishing tools on a web browser warn about spoofing pages or/and prompt to essential and necessary information that assists users to identify spoofing and potentially harmful pages. In order to discover how well users can identify phishing pages with these tools after they understand how the tools work, we designed and conducted usability test...
One cannot be a problem solver without deep understanding of what constitutes a problem. Failing to recognise and define problems presents obstacles in constructing and applying knowledge in problem solving. This has been the motivation for the authors to re-examine in the context of IT Information Technology the concept, nature and types of a prob...
Social media and online communities offer increased possibilities for connection, interaction and participation but also new media with tools for self-presentation and identity management. Interacting anonymously or eponymously, having one, none or many identities online expresses richness in online communication. Contentious identities for communi...
Higher education (HE) has not efficiently targeted a knowledge-shaped economy and has not kept up with the knowledge and IT skills demanded to resolve the problems from social- and work-exclusion. While recently unemployed knowledge workers are searching for new jobs, re-educating policies and career development options have not kept pace with work...
Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natu...
The increasing computing capacity of handsets has effectively realised the concept of a mobile computer. However, at the same time, the software to operate embedded devices has evolved from single-purpose real time systems to complex operating systems. Compared to the traditional desktop computing environments, embedded devices have particular chal...
Enterprise Application Integration EAI projects fall into six types: i) information portals, ii) data replication, iii) shared business function, iv) service-oriented architecture, v) distributed vi) business processes and vii) business-to-business integration. In order to accomplish integration, all these EAI types require source code changes to t...
Background: The fostering of creative thinking has become a key target for Greek
primary education and for music education in particular. Creativity researchers have proposed
numerous recommendations concerning fostering creative thinking in the context of primary
education. However, there is limited research regarding creativity recommendations (C...
The social impact of games to players and developers, software quality and game labour are cornerstones of a software game production model. Openness is, naturally, a significant factor for games evolution, overall acceptance and success. The paper authors focus on exploring these issues within the proprietary (closed) and non-proprietary (free/ope...
In agile software development releasing software early and frequently can be achieved as long as daily software releases which reflect the state of a project are given. Considering software quality assurance, though, it is a real challenge to verify that daily software releases have the expected functionality. Despite the existing quality control t...
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
This work proposes the use of a weighted Finite State Machine to serve as a computational model for analyzing the performance of communication protocols. The new model’s use is demonstrated by concentrating on web-based services, Internet level-5 protocols in particular, because when the latter are ported onto mobile handsets, fail to meet performa...
Computer games have become increasingly complex. Modern game specifications need to accommodate many detailed design documents, which results in increasing complexity. Complex games are difficult to understand, maintain and update, but their software cannot be extensively functional, as this might confuse the player. Consequently, game developers c...
Action-oriented service and technology development begins with the idea that people use technologies to reach their action goals. Consequently, we should investigate user needs and how they can be satisfied, and adapt services and technologies to the natural course of actions. Here, we focus on family communication and investigate mobile communicat...
Teachers play a crucial role in the development of primary school students’ creative potential in either a positive or a negative way. This paper aims to draw attention to in-service and prospective teachers’ conceptions of creativity and answer three main research questions: “What are the teachers’ conceptions and implicit theories of creativity i...
Information systems development methodologies and associated CASE tools have been considered as cornerstones for building quality in an information system. The construction and evaluation of methodologies are usually carried out by evaluation frameworks and metamodels - both considered as meta-methodologies. This chapter investigates and reviews re...
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
Information and Communication Technology (ICT) have transformed the ways we think and continue influencing our thinking. However, they do not support many ways and types of thinking. Perhaps ICT is not designed and/or realised so that could encourage and support many different ways of thinking. The authors of this work examine various types of thin...
Mobile content sharing, as a practical concept, has had limited user acceptance. There is, though, a need for improving the communication and social interaction of people, and content sharing practices can prove to be a significant factor for creating a communication culture. Current available technologies for mobile content creation and sharing im...