Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dasun Weerasinghe is active.

Publication


Featured researches published by Dasun Weerasinghe.


Journal of Antimicrobial Chemotherapy | 2011

Developing e-Bug web games to teach microbiology

David Farrell; Patty Kostkova; Lisa Lazareck; Dasun Weerasinghe; Julius Weinberg; Donna M. Lecky; Niels Adriaenssens; Tereza Koprivová Herotová; Jette Holt; Pia Touboul; Kyriakoula Merakou; Raffaella Koncan; Anna Olczak-Pienkowska; António Brito Avô; José Campos; Cliodna McNulty

As a complement to the e-Bug teaching pack, two e-Bug games were developed to provide content that aimed to entertain as well as to educate. A set of agreed learning outcomes (LOs) were provided by the scientific partners of the e-Bug Project and the games were developed using user-centred design techniques (the needs, wants and limitations of the potential game players were assessed at each stage of the design process). The e-Bug games were designed for two age groups: Junior (9-12 year olds); and Senior (13-15 year olds). A study using focus groups was done to gain an understanding as to the types of games enjoyed by the target users. According to the preliminary study, the Junior Game was developed as a platform game and the Senior Game was developed as a story-based detective game. The Junior Game consists of five levels, each associated with a set of LOs. Similarly, the Senior Game consists of four missions, each comprising five stages using problem-based learning techniques and LOs. In this paper, the process of development for each game is described in detail and an illustration is provided of how each game level or mission addresses the target LOs. Development of the games used feedback acquired from children in four schools across the UK (Glasgow, London and two in Gloucester). The children were selected according to their willingness to participate. European Partners of the e-Bug Project also provided further support, translation and requests for modifications. The knowledge gained of LOs and further evaluation of the games is continuing, and preliminary results are in press. The final versions of the games, translated into 11 European languages, are available online via www.e-bug.eu.


Journal of Antimicrobial Chemotherapy | 2011

Overview of e-Bug: an antibiotic and hygiene educational resource for schools

Cliodna McNulty; Donna M. Lecky; David Farrell; Patty Kostkova; Niels Adriaenssens; Tereza Koprivová Herotová; Jette Holt; Pia Touboul; Kyriakoula Merakou; Raffaella Koncan; Anna Olczak-Pienkowska; António Brito Avô; José Campos; Natasha Barbouni; Jiří Beneš; Carla Rodriguez Caballero; Guiseppe Cornaglia; Charles E. L. B. Davis; Stijn De Corte; Ed de Quincey; Pierre Dellamonica; Dimitra Gennimata; Herman Goossens; Pawel Grzesiowski; Gawesh Jawaheer; Jenny Kremastinou; Lisa Lazareck; Marianne Noer; Monika Nowakowska; Dasun Weerasinghe

Antibiotic resistance is an increasing community problem and is related to antibiotic use. If antibiotic use could be reduced, the tide of increasing resistance could be stemmed. e-Bug is a European project involving 18 European countries, partly funded by The Directorate-General for Health and Consumers (DG SANCO) of the European Commission. It aims to develop and disseminate across Europe a junior and senior school teaching pack and web site (hosting the lesson plans and complementary games) that teach young people about prudent antibiotic use, microbes, transmission of infection, hygiene and vaccines. The aim of e-Bug is to increase young peoples understanding, through enjoyable activities, of why it is so important to use antibiotics correctly in order to control antibiotic resistance, and to have good hand and respiratory hygiene to help reduce the spread of infection. Within the senior school pack the sexual transmission of infections has also been included, as the peak age of chlamydial infection is in 16-24 year olds. Teachers, young people and the consortium of 18 countries were closely involved with agreeing learning outcomes and developing the resource activities. Young people helped create the characters and microbe artwork. The resources have been translated, adapted for and disseminated to schools across 10 countries in Europe, and endorsed by the relevant government departments of health and education. The web site has been accessed from >200 countries. The resources will be translated into all European Union languages, and have been used to promote European Antibiotic Awareness Day and better hand and respiratory hygiene during the influenza pandemic in 2009.


Journal of Antimicrobial Chemotherapy | 2011

Computer games to teach hygiene: an evaluation of the e-Bug junior game

David Farrell; Patty Kostkova; Julius Weinberg; Lisa Lazareck; Dasun Weerasinghe; Donna M. Lecky; Cliodna McNulty

Handwashing, respiratory hygiene and antibiotic resistance remain major public health concerns. In order to facilitate an effective outcome when teaching the basic principles of hand and respiratory hygiene, educational interventions should first target school children. As computer games are ubiquitous in most childrens lives, e-Bug developed computer games targeted at teaching children handwashing, respiratory hygiene and antibiotic resistance. The games were designed for two target audiences: junior school children (9-12 year olds); and senior school children (13-15 year olds). Between May and August 2009, the finalized junior game underwent an evaluation in three UK schools (in Glasgow, Gloucester and London), involving 62 children in the schools and ∼ 1700 players accessing the junior game online. The e-Bug junior game consists of a number of levels of play, each of which promotes a set of learning outcomes (LOs). These LOs, complementary to those in the e-Bug packs, are expressed through the game mechanics (the rules of the game) rather than through story or dialogue. Although the junior games evaluation demonstrated a statistically significant change in the knowledge for only a small number of given LOs, because many children had the required knowledge already before playing the game, this is e-Bugs first statistical study on the junior game and the first comprehensive evaluation of its kind. Future work includes a re-examination of the quiz-style questionnaires utilized in this study and an exploration of the potential knowledge change acquired strictly through engagement.


international conference on pervasive computing | 2008

Timestamp authentication protocol for remote monitoring in eHealth

Kalid Elmufti; Dasun Weerasinghe; Muttukrishnan Rajarajan; Veselin Rakocevic; S.H. Khan

Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process, showing many advantages timestamps have over other authentication methods. The paper presents the design principles for timestamp based authentication protocols in remote monitoring systems and proposes a specific protocol to implement such a system.


International Journal of Electronic Healthcare | 2007

Securing electronic health records with novel mobile encryption schemes

Dasun Weerasinghe; Kalid Elmufti; Muttukrishnan Rajarajan; Veselin Rakocevic

Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.


pervasive computing technologies for healthcare | 2006

XML Security based Access Control for Healthcare Information in Mobile Environment

Dasun Weerasinghe; Kalid Elmufti; Muttukrishnan Rajarajan; Veselin Rakocevic

Mobile and wireless devices have penetrated the health care sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such health care applications the privacy and security of the transmitted information must be preserved. Also different personal involved in the Healthcare industry must have different access privileges to the patient information. In this paper we present a protocol that will share the information securely to the intended recipient using the XML encryption and XML signature technologies


electronic healthcare | 2008

Device Data Protection in Mobile Healthcare Applications

Dasun Weerasinghe; Muttukrishnan Rajarajan; Veselin Rakocevic

The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.


pervasive computing technologies for healthcare | 2006

Privacy in Mobile Web Services eHealth

Kalid Elmufti; Dasun Weerasinghe; Muttukrishnan Rajarajan; Veselin Rakocevic; S.H. Khan

There are many advantages to deploying mobile devices in eHealth systems. However; security is still an issue: in particular authentication and user privacy. In this paper we propose a novel architecture that integrates 3GPP UMTS mobile technology with Web services. This will help address authentication and privacy concern within eHealth environment. The architecture makes use of the generic authentication architecture from the 3GPP and the single sign-on system to authenticate mobile users to a health authentication server to give access to various eHealth service providers. The platform for Privacy Preferences Project is thus used to manage privacy in the system


international conference of the ieee engineering in medicine and biology society | 2010

Learning by gaming - evaluation of an online game for children

Lisa Lazareck; David Farrell; Patty Kostkova; Donna M. Lecky; Cliodna McNulty; Dasun Weerasinghe

Playing computer games is widely popular among children and teenagers as an entertainment activity; meanwhile, playing computer games also provides a learning opportunity. For example, the rules of the game have to be learned by the player in order to improve his/her performance. Based on that principle, the City eHealth Research Centre (CeRC) developed a web game for 13–15 year olds, whereby the player becomes an investigator who attends the scene of an incident that involves microbes. There are four missions in total, each involving a mystery that the player needs to solve and learning objectives that need to be taught - such as antibiotic resistance and the importance of hygiene. This paper presents the results from a game evaluation that took place between July of 2009, in four UK schools (Glasgow, Gloucester, London), with 129 students; whereby 98% of the students commented positively about playing the game. Subsequently, CeRC has improved the game and developed an interactive educational games portal (www.edugames4all.com) for different age groups of web game enthusiasts.


Methods of Information in Medicine | 2008

Patient Privacy Protection Using Anonymous Access Control Techniques

Dasun Weerasinghe; Muttukrishnan Rajarajan; Kalid Elmufti; Veselin Rakocevic

OBJECTIVE The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. METHODS In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. RESULTS The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. CONCLUSION The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

Collaboration


Dive into the Dasun Weerasinghe's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S.H. Khan

City University London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge