Jyri Rajamäki
Laurea University of Applied Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jyri Rajamäki.
symposium on communications and vehicular technology in the benelux | 2010
Jyri Rajamäki; John Holmström; Juha Knuuttila
Emergency vehicles are increasingly dependent on ICT systems. Public safety responders need is to enhance mission critical voice with broadband data. Command and control applications aboard a vehicle are commonplace. There is a need to ease situational awareness and decision making by using cameras and sensor information. However, countries and user organizations are developing own solutions according to their legislation and requirements, because uniform standards are missing. This paper is a kick off for creating a common international ICT infrastructure for all emergency vehicles. This design research study concentrates on the data communications layer representing a tested prototype for a new multichannel data communication concept based on the Distributed Systems intercommunication Protocol (DSiP). This study is a part of a larger R&D project, aimed at starting development of standards used by like-minded countries and possibly with EUROPOL and FRONTEX.
ubiquitous positioning indoor navigation and location based service | 2012
Jyri Rajamäki
The aim of this study is to provide an improved understanding of the structural characteristics and the dynamic evolution of cross-border satellite-based tracking services. The study is based on the results and lessons learned from the SATERISK research project executed 2008-2011, with special attention taken how to utilize that knowledge within a new safety and security services. In this context, the NABC (Need, Approach, Benefits and Competition) approach is used. The study shows that most satellite-based tracking systems and services do not form a coherent whole. With the risk analysis procedures and tools developed in the SATERISK project, a unique risk profile for each use case can be created. This enables better products and services for both public and private security organizations.
european intelligence and security informatics conference | 2015
Jyri Rajamäki; Rauno Pirinen
Modern societies are highly dependent on different critical software-intensive information systems that support society. Designing security for these information systems has been particularly challenging since the technologies that make up these systems. Revolutionary advances in hardware, networking, information and human interface technologies require new ways of thinking about how these resilient software-intensive systems (SIS) are conceptualized, built and evaluated. Our research in this area is to develop a design theory (DT) for resilient SISs so that communities developing and operating different information technologies can share knowledge and best practices using a common frame of reference.
european intelligence and security informatics conference | 2013
Jyri Rajamäki; Paresh Rathod
Information and Communication Technology (ICT) service of the Public Protection and Disaster Relief (PPDR) are currently delivered in heterogeneous and tailor made methods. Majority of PPDR actors prefers their own technology, contract and process implementation. Utility, cloud and service-oriented computing are cutting-edge technologies that standardize ICT services and solutions. This paper studies ICT services and argues technologies, contracts and processes should be standardized in PPDR. This research also explores leveraging benefits and challenges of cloud base utility and service-oriented computing.
Archive | 2017
Jyri Rajamäki
Functions vital to society, such as critical infrastructure protection (CIP) and public protection and disaster relief (PPDR), are increasingly dependent on networks, electricity, and data processing infrastructure. Incidents such as natural hazards and organized crime do not respect national boundaries. As a consequence, there is an increased need for European collaboration and information sharing related to CIP and PPDR communications and information exchange technologies and procedures. However, “trust” could be seen as the most important issue with regard to multi-agency cooperation. Cyber security should be seen as a key enabler for the development and maintenance of trust in the digital world. It is important to complement the currently dominating “cyber security as a barrier” perspective by emphasizing the role of “cyber security as an enabler” of new interactions and services—and recognizing that trust is a positive driver for growth. CIP and PPDR are becoming more and more dependent on unpredictable cyber risks. Everywhere present computing means that CIP and PPDR organizations do not know when they are using dependable devices or services and there are chain reactions of unpredictable risks. If cyber security risks are not made ready, CIP and PPDR organizations will face severe disasters over time. Investing in systems that improve confidence and trust can significantly reduce costs and improve the speed of interaction. From this perspective, cyber security should be seen as a key enabler for the development and maintenance of trust in the digital world.
2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) | 2015
Rauno Pirinen; Jyri Rajamäki
This study discusses design theory with focus on critical digital information services that support collective service design targets in international over border environments. Designing security for such digital systems has been challenging because of the technologies that make up the systems for digital information sharing. More specifically, new advances in hardware, networking, information, and human interface need new ways of thinking and realization to, for example, design, build, evaluate, and conceptualize a resilient digital service or system. This study focuses on the methodological contribution of design theory to resilient digital systems and further serves as a continuum to existing studies.
2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) | 2015
Antti Miettinen; Jani Nousiainen; Jyri Rajamäki; Juha Knuuttila
The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.
international conference on interactive collaborative learning | 2014
Jyri Rajamäki
Research, Development and Innovation (RDI later on the dialogue was expanded to include a more extensive network with other students, teachers, researchers, companies (both device and service developers and end-users), public end-users and publicly-funded expert organizations for financing RD&I. MOBI has expanded not only to an academic multi-disciplinary collaboration but also collaboration with four companies and government officials as police and emergency departments. Our paper describes how the project was integrated into the study units and studies in general, as well as providing a description of the roles of different stakeholders when creating a learning environment. We will reclaim these lessons learned within our following RD&I projects, such as MACICO.
international conference on applied mathematics | 2017
Umar B. Muhammad; Absalom E. Ezugwu; Paulinus O. Ofem; Jyri Rajamäki; Adewumi O. Aderemi
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.
international conference on applied mathematics | 2017
Jyri Rajamäki; Rauno Pirinen
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.