Eleni Berki

Eleni Berki
University of Jyväskylä | JYU · Department of Computer Science and Information Systems

Ph.D.

About

108
Publications
17,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
849
Citations
Introduction
Docent, Dr Eleni Berki (eleni.e.berki@jyu.fi) is Adjunct Professor of Software Quality and Formal Modelling at the Faculty of Information Technology, University of Jyväskylä, Finland. Previously she worked as a Senior Research Fellow at the University of Tampere. Eleni's research and teaching interests are in Cybersecurity, Formal Metamodelling, Process Improvement, Free/Open Source SW, Theory of Computation and SW Engineering. She is interested in the concept of 'learnability' as it arises in diverse domains such as tools design, deep learning environments, artificial intelligence and socio-cognitive spaces. She has supervised and examined many MSc and PhD theses and co-authored more than 150 international publications including journal/conference papers, industrial reports and other.

Publications

Publications (108)
Conference Paper
Full-text available
Migrating the teaching and learning activities to the Internet invites a plethora of cyber risks and security threats. As distance learning has undergone a spectacular development and use recently, especially in the Covid-19 era-when it was, once, only temporarily established-, it is considered of utmost importance to ensure the issue of security a...
Conference Paper
Full-text available
The abrupt outbreak of the coronavirus pandemic throughout the world in March 2020 resulted in the sudden closure of all schools, colleges and universities, institutions, and an unprecedented pivot to remote learning. Students and teachers were confronted with the the overwhelming challenge of migrating from the traditional face-to-face or hybrid m...
Chapter
The SPI Manifesto provides a framework for guiding software development organisations in their improvement efforts. Based on the Values of People, Business and Change, which are supported and informed by one or more of the ten principles, the designer and developer can avoid pitfalls, minimise risks and make their business successful. It has been e...
Chapter
Over a decade has passed since the inception of the SPI Manifesto. The fact that the signatories of the manifesto emanate from both the academic and the industrial communities enables a robust exchange of ideas and experiences. Continuous enrichment and refinement have been evidenced in publications, industrial projects, and consultancy across both...
Chapter
Industry 4.0 is universally referred to as the fourth industrial revolution. It is a current trend of automation and data exchange in manufacturing technologies. The computerisation of manufacturing includes, amongst other, cyber-physical systems, the Internet of Things (IoT), cloud computing and cognitive computing. There are many challenges in th...
Article
Full-text available
Deep and meaningful learning (DML) in distant education should be an essential outcome of quality education. In this literature review, we focus on e-learning effectiveness along with the factors and conditions leading to DML when using social virtual reality environments (SVREs) in distance mode higher education (HE). Hence, a systematic literatur...
Conference Paper
Full-text available
The social disruption caused by the sudden eruption of the Corona Virus pandemic has shaken the whole world, influencing all levels of education immensely. Notwithstanding there was a lack of preparedness for this global public health emergency which continues to affect all aspects of work and life. The problem is, naturally, multifaceted, fast evo...
Presentation
Full-text available
Power point presentation at the INSPIRE Conference in London in 2020 named Challenges of Rapid Migration to Fully Virtual Education in the age of the Coronavirus pandemic� Experiences from across the world�by 34 co-authors from 14 countries A great experience from 14 countries from all over the world.
Article
Full-text available
The Software Process Improvement (SPI) Manifesto is based on three basic values: people, business focus and organisational change underpinning the philosophy of SPI. In turn, these values bring up to date certain SPI principles serving as a foundation for action in software development. The authors of this paper carried out a pilot expert validatio...
Article
Measuring viewers’ experiences of films has become a critical issue for filmmakers because all kinds of audiences now have access to new releases from all over the world. Some approaches have focused on the cognitive level of the experience, while others have emphasized the structure of films. Additionally, some have used quantitative objective met...
Chapter
Software Process Improvement (SPI) has been founded on the belief that a well-defined and executed process is likely to produce a high-quality pro-duct. Improving a product might provide insights for future improvement efforts. However, this bottom-up approach does not necessarily lead to improvement, considering in particular that software product...
Article
A password manager stores and handles users’ passwords from different services. This relieves the users from constantly remembering and recalling many different login credentials. However, because of the poor usability and limited user experience of password managers, users find it difficult to perform basic actions, such as a safe login. Unavoidab...
Article
Full-text available
Lifelong learning is currently being embraced as a central process that could disrupt traditional educational paths. Apparently, the (ideal) type of learning often promoted is deep and meaningful learning, though it is not always required to be so. Deep learning goes beyond superficial knowledge assimilation of unlinked facts; it aims at developing...
Article
A positive image would inspire the capable but underrepresented who might otherwise give up on computing.
Conference Paper
Full-text available
Deeper learning and conceptual understanding are essential and critical elements for achieving learning process improvement in Computational Thinking (CT) curricula. For successful learning outcomes the school teachers of programming most probably have to familiarise themselves with two essential learning frameworks: i) tangible programming interfa...
Chapter
The University of Patras' Library Services designed and offered to primary and secondary schools the pilot educational program “From the Ancient to the Modern Tablets”, featuring immersive multimedia learning experiences about the book history. The pilot program consisted of three stages: a playful library tour, followed by an interactive game-base...
Conference Paper
The utilization of Technology Enhanced Learning and more specifically of Distance Education for Life-Long Learning and Continuous Professional Development are at the epicenter/focus of European policies for the improvement of the delivery of Vocational Education and Training. In this context, one of the important challenges is the design of versati...
Article
Full-text available
The University of Patras' Library Services designed and offered to primary and secondary schools the pilot educational program "From the Ancient to the Modern Tablets", featuring immersive multimedia learning experiences about the book history. The pilot program consisted of three stages: A playful library tour, followed by an interactive game-base...
Chapter
Cybersecurity professionals face increased demand to acquire the knowledge and develop the skills required to keep citizens safe from cyberattacks, predict the latter with scientific methods, and advance citizens' social awareness. A proactive multidisciplinary approach against cyberattacks is effective via the combination of multidisciplinary and...
Article
We propose a novel hierarchical sliding slice regression which in a coarse-to-fine manner represents global circular target space with a number of ordinally localized and overlapping subspaces. Our method is particularly suitable for visual regression problems where the regression target is circular (e.g., car viewing angle) and visual similarity i...
Article
Women’s under-representation in the fields of science and technology is strong; both in software houses and academic posts. We focus on the academic field by gender sensitive analysis of Information and Communication Technology (ICT) academics. The general picture given by statistics’ meta-analyses illustrates male dominance even in Finland, which...
Conference Paper
Full-text available
Open Education (OE) is a distance learning approach that was strategically chosen by the European Commission (EC) to encourage cost-effective training, upskilling and reskilling of large population groups and workforce with speed and flexibility. Institutions and businesses design and offer Open Online Courses (OOCs) to address skill gaps, organiza...
Conference Paper
Full-text available
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past. However, it has been increasingly difficult to stop more recent and sophisticated social phishing attacks. To protect the citizens from new types of phishing...
Conference Paper
Individuals and organizations utilize the cloud technology and its services in various ways. Cloud-based services are becoming increasingly popular, while there is no adequate knowledge offered for their secure use in the education for future IT professionals. It is important to understand how security and privacy issues are perceived and handled b...
Article
Full-text available
Open standardization seems to be very popular among software developers as it simplifies the standard’s adoption by the software engineering. Formal specification methods, while very promising, are being adopted slowly as the industry seems to have little motivation to move into this territory. In this paper the authors present (1) the idea of appl...
Conference Paper
Full-text available
Social virtual reality environments, also known as 3D virtual immersive environments, are three-dimensional computer-generated virtual spaces that are increasingly used in attendance-based and distance education. Thanks to their unique characteristics that separate them from two-dimensional virtual learning environments, social virtual reality envi...
Poster
Full-text available
*Password manager is an application handling and storing users’ passwords from different services. *Password manager aims to relieve the users from constantly remembering and recalling their login credentials. *Though the program is designed to help users in password management, users often encounter difficulties to perform even such basic actions...
Conference Paper
Although there are three stemmers published for the Greek language, only the one presented in this paper and called Ntais' stemmer is freely open and available, together with its enhancements and extensions according to Saroukos' algorithm. The primary algorithm (Ntais' algorithm) uses only capital letters and works with better performance than oth...
Conference Paper
The main aim of this pilot study is to investigate management anti-patterns encountered in IT innovation projects, in the long run. A quantitative research methodology was chosen. A group of software project managers in industrial innovation projects were requested to fill in a questionnaire. The collected data revealed anti-patterns, which were co...
Article
Full-text available
Preparing students adequately against online-attacks is a constant teaching and learning challenge, no matter how many advanced security-related courses have been developed for higher education curricula worldwide. Recently emphasis has also been put on online identity theft and social awareness in general. The authors research the knowledge, skill...
Conference Paper
Social engineering is the most prevalent scheme used for online attacks and identity theft. This is the reason why security-related courses, modular degree schemes and training have recently been increased in education and industry worldwide. Emphasis is put on certain subjects such as online identity theft (or phishing) and social awareness. In th...
Conference Paper
Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of s...
Article
Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens’ vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social com...
Conference Paper
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios i...
Chapter
Europe has the opportunity to utilize Open Education to train specialized workforce and boost employment by increasing MOOC quantity, speeding-up MOOC delivery and improving MOOC quality. Authors propose a crowd-sourced open mechanism called MOOCAgora for the innovative design and agile development of qMOOCs. MOOCAgora is the heart of an 8-stage bu...
Technical Report
Content: It contains some fundamental issues which have to be addressed in order to make ambient intelligence applications in smart buildings more usable and to gain acceptance from people. The report presents the crucial factors which have to be considered when determining an optimization approach for sensor arrangement. Furthermore, it briefly i...
Article
In web browsers, a variety of anti-phishing tools and technologies are available to assist users to identify phishing attempts and potentially harmful pages. Such anti-phishing tools and technologies provide Internet users with essential information, such as warnings of spoofed pages. To determine how well users are able to recognise and identify p...
Conference Paper
Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into t...
Conference Paper
Full-text available
The recommendation of the Digital Agenda Assembly 2012 to address the development of suitable socio-technical skills and expertise through open education and MOOCs in order to decrease unemployment in Europe faces three challenges: a) increase MOOC quantity, b) speed-up MOOC delivery and c) improve MOOC quality. The paper argues that a crowd-source...
Article
Full-text available
One cannot be a problem solver without deep understanding of what constitutes a problem. Failing to recognise and define problems presents obstacles in constructing and applying knowledge in problem solving. This has been the motivation for the authors to re-examine in the context of IT (Information Technology) the concept, nature and types of a pr...
Technical Report
Content: This is a preliminary report. It contains some fundamental issues which have to be addressed in order to make ambient intelligence environment more usable and to gain acceptance from people. Essentially, it presents the crucial factors which have to be considered when determining an optimization approach for sensor arrangement. Furthermor...
Technical Report
Content: This report explains: mechanism that can be used for the copyright protection of video content; privacy and security requirements for Interactive 360 degree panorama video player when it is used for live streaming entertainment shows like sports, reality shows, and music concerts; platforms for sharing 360 degree videos and mechanisms t...
Book
Full-text available
This booklet was published by the International Bureau of Education (UNESCO) in collaboration with the International Academy of Education (IAE), in the Educational Practices Series (no 25). The booklets published in Educational Practice Series describe in a simple language some eight to twelve universally applicable principles for a specific topic,...
Conference Paper
Software quality assurance and ‘dark’ social engineering seem to currently constitute a rather ‘closed-case’ body of scientific knowledge. Specific information and software quality criteria on corrective and reactive (not pro-active or preventive!) maintenance are shared by a few research groups and a small number of anti-phishing technology compan...
Conference Paper
Electronic health records implementation has been a challenge for many governments worldwide, who have tried to realise a quality and cost-effective implementation through closed and/or open source software. The paper discusses the background and rationale for implementing health records through an open source software development process model. Wh...
Chapter
Social media and online communities offer increased possibilities for connection, interaction and participation but also new media with tools for self-presentation and identity management. Interacting anonymously or eponymously, having one, none or many identities online expresses richness in online communication. Contentious identities for communi...
Conference Paper
Full-text available
This paper deals with the learning re-design of a course in Open Source and Software Quality. The instructors utilised concepts of problem-focused education; without, though, strictly following the principles as defined in the classic application of the approach. The course participants worked either in teams or alone, while emphasis was put on the...
Conference Paper
This paper deals with the learning re-design of a course in Open Source and Software Quality. The instructors utilised concepts of problem-focused education; without, though, strictly following the principles as defined in the classic application of the approach. The course participants worked either in teams or alone, while emphasis was put on the...
Conference Paper
Many anti-phishing solutions turn to be ineffective because they have poor usability. There have been significant improvements when usability and phishing detection techniques are handled separately. However, handling usability in anti-phishing solutions still remains a challenging task. This is because considering usability for antiphishing so...
Conference Paper
This management summary comments on the early outcomes of an R&D project with industrial and academic collaboration. In particular, the project’s requirements elicitation phase is presented, during which the authors determined the security and usability requirements of different use-cases for the Interactive 360 0 panorama video player. The use...
Technical Report
Content: The report explains the security and usability requirements proposed by our team for the different use-cases of Interactive 360 degree panorama video player. Impact: This document contains the outcomes of requirements elicitation that our team conducted in order to determine the security and usability requirements of different use-cases...
Chapter
Higher education (HE) has not efficiently targeted a knowledge-shaped economy and has not kept up with the knowledge and IT skills demanded to resolve the problems from social- and work- exclusion. While recently unemployed knowledge workers are searching for new jobs, re-educating policies and career development options have not kept pace with wor...
Technical Report
Content: The report explains the security and usability policies proposed by our team for the Key2phone system. Impact: This report contains the source code in Finite State Process (FSP), which explains the security and usability policies in the Key2phone system proposed by our team. Further, the report also points out some security challenges...
Conference Paper
Anti-phishing tools on a web browser warn about spoofing pages or/and prompt to essential and necessary information that assists users to identify spoofing and potentially harmful pages. In order to discover how well users can identify phishing pages with these tools after they understand how the tools work, we designed and conducted usability test...
Article
One cannot be a problem solver without deep understanding of what constitutes a problem. Failing to recognise and define problems presents obstacles in constructing and applying knowledge in problem solving. This has been the motivation for the authors to re-examine in the context of IT Information Technology the concept, nature and types of a prob...
Article
Social media and online communities offer increased possibilities for connection, interaction and participation but also new media with tools for self-presentation and identity management. Interacting anonymously or eponymously, having one, none or many identities online expresses richness in online communication. Contentious identities for communi...
Article
Higher education (HE) has not efficiently targeted a knowledge-shaped economy and has not kept up with the knowledge and IT skills demanded to resolve the problems from social- and work-exclusion. While recently unemployed knowledge workers are searching for new jobs, re-educating policies and career development options have not kept pace with work...
Article
Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natu...
Conference Paper
The increasing computing capacity of handsets has effectively realised the concept of a mobile computer. However, at the same time, the software to operate embedded devices has evolved from single-purpose real time systems to complex operating systems. Compared to the traditional desktop computing environments, embedded devices have particular chal...
Article
Enterprise Application Integration EAI projects fall into six types: i) information portals, ii) data replication, iii) shared business function, iv) service-oriented architecture, v) distributed vi) business processes and vii) business-to-business integration. In order to accomplish integration, all these EAI types require source code changes to t...
Article
Full-text available
Background: The fostering of creative thinking has become a key target for Greek primary education and for music education in particular. Creativity researchers have proposed numerous recommendations concerning fostering creative thinking in the context of primary education. However, there is limited research regarding creativity recommendations (C...
Article
The social impact of games to players and developers, software quality and game labour are cornerstones of a software game production model. Openness is, naturally, a significant factor for games evolution, overall acceptance and success. The paper authors focus on exploring these issues within the proprietary (closed) and non-proprietary (free/ope...
Conference Paper
In agile software development releasing software early and frequently can be achieved as long as daily software releases which reflect the state of a project are given. Considering software quality assurance, though, it is a real challenge to verify that daily software releases have the expected functionality. Despite the existing quality control t...
Chapter
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
Article
Full-text available
This work proposes the use of a weighted Finite State Machine to serve as a computational model for analyzing the performance of communication protocols. The new model’s use is demonstrated by concentrating on web-based services, Internet level-5 protocols in particular, because when the latter are ported onto mobile handsets, fail to meet performa...
Article
Computer games have become increasingly complex. Modern game specifications need to accommodate many detailed design documents, which results in increasing complexity. Complex games are difficult to understand, maintain and update, but their software cannot be extensively functional, as this might confuse the player. Consequently, game developers c...
Article
Action-oriented service and technology development begins with the idea that people use technologies to reach their action goals. Consequently, we should investigate user needs and how they can be satisfied, and adapt services and technologies to the natural course of actions. Here, we focus on family communication and investigate mobile communicat...
Article
Full-text available
Teachers play a crucial role in the development of primary school students’ creative potential in either a positive or a negative way. This paper aims to draw attention to in-service and prospective teachers’ conceptions of creativity and answer three main research questions: “What are the teachers’ conceptions and implicit theories of creativity i...
Article
Information systems development methodologies and associated CASE tools have been considered as cornerstones for building quality in an information system. The construction and evaluation of methodologies are usually carried out by evaluation frameworks and metamodels - both considered as meta-methodologies. This chapter investigates and reviews re...
Chapter
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
Chapter
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cyb...
Conference Paper
Full-text available
Information and Communication Technology (ICT) have transformed the ways we think and continue influencing our thinking. However, they do not support many ways and types of thinking. Perhaps ICT is not designed and/or realised so that could encourage and support many different ways of thinking. The authors of this work examine various types of thin...
Article
Mobile content sharing, as a practical concept, has had limited user acceptance. There is, though, a need for improving the communication and social interaction of people, and content sharing practices can prove to be a significant factor for creating a communication culture. Current available technologies for mobile content creation and sharing im...