Josef Noll

Josef Noll
University of Oslo · Department of Technology Systems

Prof. Dr., PhD
"Connect the Future", digital- and energy-equity for every single human. http://BasicInternet.org/get-involved

About

164
Publications
61,096
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,029
Citations
Introduction
Josef Noll is Visionary at the Basic Internet Foundation and professor at the University of Oslo. Through the foundation he addresses impact research as the basis of sustainable development and digital inclusion. A key topic is the network delivering mobile services. He is also head of research in Movation, Norway's open innovation company for mobile services. The company supported more than 200 start-ups in the last ten years. He was leader of several EU and Eurescom projects.
Additional affiliations
September 2001 - May 2005
Telenor
Position
  • Consultant
August 1997 - August 2001
Telenor
Position
  • Project Manager
September 1985 - December 1990
Ruhr University Bochum
Position
  • Research Assistant

Publications

Publications (164)
Article
Abstract Background Artificial Intelligence (AI) has great potential to transform health systems to improve the quality of healthcare services. However, AI is still new in Tanzania, and there is limited knowledge about the application of AI technology in the Tanzanian health sector. Objectives This study aims to explore the current status, challen...
Article
Full-text available
Digital health is considered an opportunity to engage a wider community in disease control for public health. It has been used in healthcare consultation, in medical treatments and in reporting emergencies. The current study developed digital health literacy content for public health education and assessed its effects on porcine cysticercosis preva...
Article
Porcine cysticercosis is endemic in Tanzania, especially in the Southern Highlands, Central areas and Northern Highlands regions of the country. It is a condition that reduces pork quality and suitability for human consumption and hence affecting public health and the pig industry. The prevalence and possible associated factors for porcine cysticer...
Article
Full-text available
Background Community health education is one of the most effective measures to increase health literacy worldwide and can contribute to the achievement of specific targets of the Sustainable Development Goal 3. Digitalized health education materials can improve health knowledge as a dimension of health literacy and play an important role in disease...
Article
Purpose This paper aims to present arguments about how a complex concept of privacy labeling can be a solution to the current state of privacy. Design/methodology/approach The authors give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives: Business, Legal, Regulatory, Usability and Human...
Article
Full-text available
Background Intimate partner violence (IPV) during pregnancy is a global health problem with adverse consequences for mothers, infants and families. We hypothesise that information about IPV and safety behaviours during pregnancy has the potential to increase quality of life and the use of safety behaviours and prevent IPV. Methods A multicentre ra...
Article
Full-text available
Limited access to health education can be a barrier for reaching the Sustainable Development Goals, especially in rural communities in sub-Saharan Africa. We addressed this gap by installing community information spots (InfoSpots) with access to the internet and a locally stored digital health education platform (the platform) in Migoli and Izazi,...
Article
Full-text available
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. New im...
Article
Full-text available
This paper summarizes our work on studying educational applications enabled by the introduction of a new information layer called InfoInternet. This is an initiative to facilitate affordable access to internet-based information in communities with network scarcity or economic problems from the Global South. InfoInternet develops both networking sol...
Preprint
Full-text available
Background Porcine cysticercosis is endemic in Tanzania, especially in the southern, central part and northern highlands of the country. The disease reduces meat quality and affects pig industry. This study investigated porcine cysticercosis prevalence and possible risk factors for reference in preparation for sustainable control measures. Methods...
Article
Full-text available
Background: Traditionally, health promotion and health education have been provided to communities in the global south in the form of leaflets or orally by health care workers. Digital health interventions (DHIs) such as digital health messages accessed by smartphones have the potential to reach more people at a lower cost and to contribute to stre...
Article
Socio-cultural settings and lifestyles of communities in Taenia solium taeniosis/cysticercosis (TSTC) in endemic areas influence significantly the epidemiology of the disease. This study investigated the community perceptions and practices influencing the occurrence and endemicity of TSTC. A cross-sectional survey focusing on pig-keeping households...
Article
Full-text available
Video conferencing services based on web real-time communication (WebRTC) protocol are growing in popularity among Internet users as multi-platform solutions enabling interactive communication from anywhere, especially during this pandemic era. Meanwhile, Internet service providers (ISPs) have deployed fiber links and customer premises equipment th...
Article
Full-text available
Video on demand (VoD) services such as YouTube have generated considerable volumes of Internet traffic in homes and buildings in recent years. While Internet service providers deploy fiber and recent wireless technologies such as 802.11ax to support high bandwidth requirement, the best-effort nature of 802.11 networks and variable wireless medium c...
Preprint
Full-text available
Privacy is currently in 'distress' and in need of 'rescue', much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to argue how a new and all-encompassing concept of Privacy Labelling (the 'knight in shining armour') can come to the rescue of Privacy (the 'princess in distress'). We paint a detaile...
Preprint
Full-text available
BACKGROUND Health workers have traditionally delivered health promotion and education to rural communities in the Global South in paper leaflet formats or orally. With the rise of digital technologies, health promotion and education can be provided in innovative and more effective formats, which are believed to have a higher impact on disease preve...
Article
Full-text available
Background Health workers have traditionally delivered health promotion and education to rural communities in the Global South in paper leaflet formats or orally. With the rise of digital technologies, health promotion and education can be provided in innovative and more effective formats, which are believed to have a higher impact on disease preve...
Preprint
BACKGROUND Health promotion and health education have traditionally been given to communities in the global south in the form of leaflets or orally by healthcare workers. Digital health interventions (DHIs) such as digital health messages accessed with, for example, smartphones have the potential to reach more people at a lower cost and to contribu...
Article
Full-text available
Background Traditionally, health promotion and health education have been provided to communities in the global south in the form of leaflets or orally by health care workers. Digital health interventions (DHIs) such as digital health messages accessed by smartphones have the potential to reach more people at a lower cost and to contribute to stren...
Chapter
Internet of Things (IoT) is a growing field and its use in home automation is one of the dominating application areas. However, the end-users lack security awareness, whereas the system designers lack the incentives for building secure IoT systems. To address this challenge, we propose the notion of security classes to assess and present the securi...
Article
The Internet of Things (IoT) is a disruptive technology that complements the usage of modern day information and communications technology (ICT) systems. IoT systems, with their small form and cost factor coupled with their increasing reliability, have made huge inroads in all markets. Connected to some form of interconnected networks, either to th...
Chapter
Full-text available
This chapter aims at documenting how digital divide determinants are affecting the ability of digital infrastructure to be used as a platform for health information and education in Sub-Saharan Africa. More specifically, the chapter draws from case studies in Madagascar, Niger, Côte d’Ivoire, Senegal, and Tanzania, and we showcase the best praxis o...
Article
Full-text available
The concept of digital literacy has been defined in numerous ways over the last two decades to incorporate rapid technological changes, its versatility, and to bridge the global digital divide. Most approaches have been technology-centric with an inherent assumption of cultural and political neutrality of new media technologies. There are multiple...
Preprint
Full-text available
The commercial launch of 6G communications systems and United Nations Sustainable Development Goals, UN SDGs, are both targeted for 2030. 6G communications is expected to boost global growth and productivity, create new business models and transform many aspects of society. The UN SDGs are a way of framing opportunities and challenges of a desirabl...
Article
Full-text available
The electricity grid is an important critical infrastructure that is undergoing major changes, due to the Internet of Things (IoT) and renewable energy, heading towards the smart grid. However, besides the many good promises of the smart grid, such as better peak control, cheaper maintenance, and more open energy markets, there are many new securit...
Article
Full-text available
Objective To assess the effect of the Pregnant+ app on the 2-hour glucose level of the routine postpartum oral glucose tolerance test (OGTT) among women with gestational diabetes mellitus (GDM). The Pregnant+ app was designed to provide information about GDM, and promote physical activity and a healthy diet. Design A multicentre, non-blinded rando...
Article
Full-text available
Background Intimate partner violence (IPV) around the time of pregnancy is a recognized global health problem with damaging consequences. However, little is known about the effect of violence assessment and intervention during pregnancy. We hypothesise that routine enquiry about IPV during pregnancy, in combination with information about IPV and sa...
Conference Paper
Full-text available
Internet of Things (IoT) is facilitated by heterogeneous technologies, which contribute to the providing of innovative services in a large number of application domains. The satisfaction of security and privacy requirements in this scenario are becoming a main challenge for IoT systems and their developers. Nevertheless, most works on IoT security...
Article
A dvanced technological innovations and the Internet appear to be available everywhere. However, a large section of society is still on the wrong side of the digital divide, unable to fully enjoy the benefits of the revolutionary changes taking place. This article explores the scientific basis for secure easy-to-use Internet and web access for the...
Conference Paper
In addition to mobile phones 5G mobile networks will have to support billion IoT devices and applications. To achieve this objective 5G relies in the network slicing concept which is not yet fully understood. This paper describes how 5G network slicing can accommodate Smart Home, a popular IoT application. The state of the art of Smart Home is thor...
Preprint
Full-text available
This paper summarises our work on studying educational applications enabled by the introduction of a new information layer called InfoInternet. This is an initiative to facilitate affordable access to internet based information in communities with network scarcity or economic problems from the Global South. InfoInternet develops both networking sol...
Preprint
Full-text available
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. Severa...
Conference Paper
So far the 5G mobile systems are mostly known for their superiority in terms of performance, flexibility and cost efficiency but are less known for their social benefit. In this paper, the huge social benefit of 5G is demonstrated through the realization of the Internet Light. The Internet Light is aiming at providing free access to Internet inform...
Article
Full-text available
Background: The increasing prevalence of gestational diabetes mellitus (GDM) among women of different ethnic backgrounds provides new challenges for health care professionals, who often find it difficult to provide information about the management of this disease to such individuals. Mobile health (mHealth) may act as a useful tool for blood sugar...
Book
Full-text available
We are at the beginning of a new age of business, where dynamic interaction is the driving force for whatever kind of business. To draw from a known analogy, “bring your own device” (BYOD) exemplifes the trends of devices accessing processes and information on enterprises. In the upcoming years, not only phones, tablets, and computers will demand a...
Article
Full-text available
The Digital Divide is one of the key challenges for mankind. Despite attempts to digitally include people, the divide is bigger than ever. This contribution [1] to a sustainable future promotes “Internet lite” as the new paradigm for providing everyone with the opportunity to participate in the digital society. The current paper first addresses the...
Conference Paper
Full-text available
Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like th...
Article
Full-text available
Introduction The promotion of a healthy diet, physical activity and measurement of blood glucose levels are essential components in the care for women with gestational diabetes mellitus (GDM). Smartphones offer a new way to promote health behaviour. The main aim is to investigate if the use of the Pregnant+ app, in addition to standard care, result...
Conference Paper
Full-text available
This paper analyzes economical and technological aspects for service provisioning on varying networks. Though mobile networks are continuously evolving, the use of mobile broadband is and will be limited. Availability and affordability are two aspects, which are addressed in this paper through the introduction of basic information and low capacity...
Chapter
Full-text available
Urban and peri-urban growth is increasing worldwide and Europe is now one of the most urbanized continents in the world. Oslo is one of the fastest growing cities in Europe. This creates pressure on its infrastructure, including traffic and envi-ronmental urban quality. Additionally, vehicular traffic is a major contributor to CO2 emissions, which...
Conference Paper
Full-text available
The Basic Internet Foundation aims at optimized content delivery for capacity-limited networks, and thus provides free access to basic information to everyone. In this paper we describe the main technological challenges of the content delivery, being the concept of information, the remote administration of access points and the inclusion of Interne...
Book
Full-text available
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on d...
Article
Full-text available
The prevalence of Gestational Diabetes Mellitus (GDM) is increasing worldwide. Controlling blood sugar levels is fundamental to the management of GDM. Current practice in Norway includes patients registering blood sugar levels in a booklet and receiving verbal and/or written health information. A smartphone application may provide patients individu...
Data
Full-text available
Article
Full-text available
Embedded Systems have become highly interconnected devices, being the key elements of the Internet of Things. Their main function is to capture, store, manipulate and access data of a sensitive nature. Moreover, being connected to Internet, expose them to all kind of attacks, which could cause serious consequences. Traditionally, during the design...
Conference Paper
Satellite services in the High North are utilized extensively for both communication purposes and for earth and climate observations. This paper presents a European Space Agency (ESA) funded propagation and telecom measurements campaign addressing the main challenges for this regions. The interest is in the K-band frequency 20 GHz, as these systems...
Article
Full-text available
This paper present a methodology for assessing security, privacy and depend- ability (SPD) of embedded systems. The methodology, developed through the European collaboration SHIELD, is applied for the smart grid network as deployed in the South of Norway. Three use cases, being billing, home control and alarm, are analysed in detail. The SHIELD met...
Conference Paper
Full-text available
Internet of Things, People and Services (IoTPS) systems have become increasingly popular in modern times. And this popularity increases the importance of measurable Security, Privacy, and Dependability (SPD). One of the crucial aspects for system SPD enhancement is reliable evaluation for system SPD level. The evaluation of SPD level for IoTPS syst...
Conference Paper
Full-text available
One of the main aspects of modern life is the interaction with sensors and other embedded systems. These systems become increasingly more integrated with daily life activities. They enable the interaction between a variety of components or parties (people, actuator, sensor, software, etc.). This interaction causes the appearance of new challenges i...
Conference Paper
Full-text available
We have now established the Basic Internet Foundation (BasicInternet.org), and are inviting everyone for "Impact Research". Our first Basic Internet Node is now up and running in Kinshasa (DRC Congo), and we are heading for roll-out of Basic Internet in other countries.
Conference Paper
The operation and maintenance (O&M) costs of wind turbines constitute approximately 10–15% of the lifecycle cost in onshore installations and up to 30% in offshore installations. The O&M costs for offshore wind power plants are higher than the onshore ones due to greater logistical challenges of maintaining and servicing, and the less mature state...
Conference Paper
Enterprises are adopting new business and IT models due to the growing trend of elastically scalable cloud- based collaboration services. However, enterprises are not fully embracing them because they do not want to expose their sensitive information to the cloud when someone collaborating with someone. Therefore, the paper proposes a semantic enha...
Conference Paper
Full-text available
Presents the welcome message from the conference proceedings.
Article
Today, TV white spaces are the most promising spectrum in which cognitive radios (CRs) can be deployed. The goal of this article is to investigate the potential increase in available spectrum used by the CR device. We define two knowledge levels and show that information about the TV receivers can increase the amount of available spectrum for CR de...
Article
Full-text available
In this paper we investigate the usage of cognitive radio devices within the service area of TV broadcast stations. Until now the main approach for a cognitive radio to operate in the TV bands has been to register TV broadcast stations locations and thus protecting the broadcast stations service area. Through information about TV receivers location...
Article
Full-text available
The future Internet will embrace the intelligence of Web 3.0 and the omnipresence of every day connected objects. The later was envisioned as the Internet of Things. Security and interoperability concerns are hindering the service innovations using the Internet of Things. This paper addresses secure access provision to Internet of Things-enabled se...
Article
Full-text available
This paper introduces service continuity as the main driver for 5G systems. It addresses user- and service-aspects in recently opened LTE networks, and identifies the system challenges. The main challenges are related to radio coverage, especially for the provision of high data rates for indoor users. The paper covers also network-, user- and servi...
Conference Paper
Full-text available
The mandatory and most deployed authentication method used in the Session Initiaton Protocol, the Digest Access Authentication method, is weak. Other, more secure authentication methods have emerged, but have seen little adoption yet. In this paper, support for using a generic authentication method, the Generic Security Services API, is added to th...
Article
Full-text available
Being center of both public and hazardous material transport system, railway is one of the most important critical infrastructures. This research is aiming to support secure access to information, dependable and reliable operation, efficient man- agement and maintenance of the railway infrastructure. In this regard, this paper proposes a framework...
Conference Paper
This paper proposes a semantic enhanced service proxy framework for internet-of-things cloud. The framework exposes IoT cloud's smart objects as services by virtue of service orientation and virtualization. The framework uses an adapter oriented approach to address the issue of connectivity with different types of smart objects. We employ a query b...
Article
Full-text available
In the recent years, we have seen a clear trend in consumer devices being equipped with multiple radio interfaces such as GSM, UMTS, WiFi. These types of devices will soon be ubiquitous. Since radio frequency is a limited resource, the need for sharing and re-using a radio spectrum will be even more noticeable than before. Studies show that collabo...
Conference Paper
Full-text available
In this paper, we propose an Internet of Things (IoT) virtualization framework to support connected objects sensor event processing and reasoning by providing a semantic overlay of underlying IoT cloud. The framework uses the sensor-as-a-service notion to expose IoT cloud's connected objects functional aspects in the form of web services. The frame...
Article
Full-text available
Sharing digital contents on the Web has become one of the most popular activities on the Internet. When the contents are sensitive in nature, sharing them online has security implications. Recently social relations are used extensively as access constraints to secure the content sharing. However only relation cannot provide personalized and granula...
Conference Paper
Deployment of newer generation cellular systems backed by new application usage trend, innovative device and operator's business model increase the mobile broadband traffic exponentially. It is found that most of the mobile data traffic is generated from the indoor. Increase of indoor traffic reduces the overall capacity of the cell and degrades th...