Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Laura Rafferty is active.

Publication


Featured researches published by Laura Rafferty.


hawaii international conference on system sciences | 2017

Towards a Privacy Rule Conceptual Model for Smart Toys

Laura Rafferty; Patrick C. K. Hung; Marcelo Fantinato; Sarajane Marques Peres; Farkhund Iqbal; Sy-Yen Kuo; Shih-Chia Huang

A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. In this paper, the first assumption is that children do not understand the concept of privacy and the children do not know how to protect themselves online, especially in a social media and cloud environment. The second assumption is that children may disclose private information to smart toys and not be aware of the possible consequences and liabilities. This paper presents a privacy rule conceptual model with the concepts of smart toy, mobile service, device, location, and guidance with related privacy entities: purpose, recipient, obligation, and retention for smart toys. Further the paper also discusses an implementation of the prototype interface with sample scenarios for future research works.


Archive | 2017

A Security Threat Analysis of Smart Home Network with Vulnerable Dynamic Agents

Laura Rafferty; Farkhund Iqbal; Patrick C. K. Hung

This chapter presents a security analysis of a smart home network containing vulnerable dynamic agents in the form of smart toys. As a case study, a smart toy is used as an example of an Internet of Things (IoT) device which could be potentially used as a vector into the smart home network. This chapter discusses a threat model for smart home security with a focus on the smart toy as an entry point into the network and what a threat actor could potentially achieve through this relatively new type of threat to the home.


Archive | 2016

Case Studies of Government Use of Big Data in Latin America: Brazil and Mexico

Roberto da Mota Ueti; Daniela Fernandez Espinosa; Laura Rafferty; Patrick C. K. Hung

Big Data is changing our world with masses of information stored in huge servers spread across the planet. This new technology is changing not only companies but governments as well. Mexico and Brazil, two of the most influential countries in Latin America, are entering a new era and as a result, facing challenges in all aspects of public policy. Using Big Data, the Brazilian Government is trying to decrease spending and use public money better by grouping public information with stored information on citizens in public services. With new reforms in education, finances and telecommunications, the Mexican Government is taking on a bigger role in efforts to channel the country’s economic policy into an improvement of the quality of life of their habitants. It is known that technology is an important part for sub-developed countries, who are trying to make a difference in certain contexts such as reducing inequality or regulating the good usage of economic resources. The good use of Big Data, a new technology that is in charge of managing a big quantity of information, can be crucial for the Mexican Government to reach the goals that have been set in the past under Pena Nieto’s administration. This article focuses on how the Brazilian and Mexican Governments are managing the emerging technologies of Big Data and how it includes them in social and industrial projects to enhance the growth of their economies. The article also discusses the benefits of these uses of Big Data and the possible problems that occur related to security and privacy of information.


Archive | 2015

Privacy Requirements in Toy Computing

Laura Rafferty; Marcelo Fantinato; Patrick C. K. Hung

This chapter outlines the privacy requirements for a toy computing environment. The unique architecture of toy computing requires consideration of several different factors. In this chapter we investigate the privacy requirements through formal threat modeling techniques to help the reader to get more comfortable with the toy computing architecture and how it maps to privacy threats. Next, we identify privacy requirements at legislative level, identifying privacy laws and regulations which apply to this context. The toy industry has also issued regulations for toy safety; however these regulations have no mention of privacy. While parents aim to protect the privacy of their children, we investigate the unique requirements of end users. Lastly, a demo is presented as an interface for parents to configure privacy settings for their children using mobile toy computing apps.


Enterprise Information Systems | 2018

A systematic mapping study of process mining

Ana Rocío Cárdenas Maita; Lucas Corrêa Martins; Carlos Ramón López Paz; Laura Rafferty; Patrick C. K. Hung; Sarajane Marques Peres; Marcelo Fantinato

ABSTRACT This study systematically assesses the process mining scenario from 2005 to 2014. The analysis of 705 papers evidenced ‘discovery’ (71%) as the main type of process mining addressed and ‘categorical prediction’ (25%) as the main mining task solved. The most applied traditional technique is the ‘graph structure-based’ ones (38%). Specifically concerning computational intelligence and machine learning techniques, we concluded that little relevance has been given to them. The most applied are ‘evolutionary computation’ (9%) and ‘decision tree’ (6%), respectively. Process mining challenges, such as balancing among robustness, simplicity, accuracy and generalization, could benefit from a larger use of such techniques.


hawaii international conference on system sciences | 2017

Institutional Violence Complaints in Argentina: A Privacy Study

Jorge Roa; Pablo David Villarreal; Marcelo Fantinato; Patrick C. K. Hung; Laura Rafferty

Argentina is a federal republic located in South America. Despite Argentina’s redemocratization in 1983, conditions favoring human rights abuses still persist. Institutional violence refers to structured practices of human rights violation by state officials belonging to public institutions. In this paper, we outline and discuss privacy issues in institutional violence complaints in Argentina. To this aim, we defined a BPMN process model for registering victims’ complaints in a database, and proposed an approach to investigate the privacy of such process from a threat modeling perspective. With the approach, we identified privacy threats of information disclosure and content unawareness, and defined privacy requirements and controls needed to mitigate these threats.


Archive | 2015

Introduction to Toy Computing

Laura Rafferty; Patrick C. K. Hung

Toys have evolved over the ages from simple dolls and cars to electronic toys, and more recently have been integrating mobile technologies. Toy computing incorporates the physical component of a traditional toy combined with networking and sensory capabilities of mobile devices. Current trends from Toy Fair 2014 and 2015 indicate the growing popularity of augmented reality toys and integration with smartphones and mobile apps. This chapter introduces the concept of toy computing and its place in the industry. Further, this chapter also outlines an architectural model for toy computing illustrating the interactions between the child user, the physical toy component, the mobile device and mobile service.


Archive | 2016

Introduction to Big Data

William Rafferty; Laura Rafferty; Patrick C. K. Hung

Big data is a term that has been gaining considerable attention in recent years. Big data is essentially a massive amount of data that can be analyzed and used to make decisions. There are three main characteristics associated with big data: volume, variety and velocity. There are many motivations for the adoption of big data; this data has remarkable potential to drive innovation, the economy, productivity and future growth. Big data analytics has become very popular in the area of marketing, driving up value by understanding and engaging customers more effectively. There are many industries that have adopted the use of big data analytics and are experiencing fantastic results; the healthcare, retail, insurance and telecommunications industries have all displayed the endless possibilities of implemented big data into their operations. However, as more information is collected through big data, there becomes more concern for individuals’ privacy. To mitigate these potential risks, policies have been put into place such as the Personal Information Protection and Electronic Documents Act (PIPEDA). Furthermore, due to the nature of the technologies within the Internet of Things (IoT), there are security concerns. These systems are very resource-constrained which results in a large amount of attention in cryptography and security engineering. This paper provides an introduction to the concepts of big data, motivations, some case studies, and a brief discussion on privacy.


International Symposium Computational Modeling of Objects Represented in Images | 2016

A Study of Children Facial Recognition for Privacy in Smart TV

Patrick C. K. Hung; Kamen Kanev; Farkhund Iqbal; David Mettrick; Laura Rafferty; Guan-Pu Pan; Shih-Chia Huang; Benjamin C. M. Fung

Nowadays Smart TV is becoming very popular in many families. Smart TV provides computing and connectivity capabilities with access to online services, such as video on demand, online games, and even sports and healthcare activities. For example, Google Smart TV, which is based on Google Android, integrates into the users’ daily physical activities through its ability to extract and access context information dependent on the surrounding environment and to react accordingly via built-in camera and sensors. Without a viable privacy protection system in place, however, the expanding use of Smart TV can lead to privacy violations through tracking and user profiling by broadcasters and others. This becomes of particular concern when underage users such as children who may not fully understand the concept of privacy are involved in using the Smart TV services. In this study, we consider digital imaging and ways to identify and properly tag pictures of children in order to prevent unwanted disclosure of personal information. We have conducted a preliminary experiment on the effectiveness of facial recognition technology in Smart TV where experimental recognition of child face presence in feedback image streams is conducted through the Microsoft’s Face Application Programming Interface.


Archive | 2015

Toy Computing Background

Laura Rafferty; Brad Kroese; Patrick C. K. Hung

The purpose of this chapter is to provide a background on the fundamental concepts of Toy Computing, including mobile services, physical computing, and augmented reality. It will also present some examples of toy computing products currently on the market. The chapter will also provide a background on security and privacy and relevant research works on these topics in order to provide the necessary foundations for the rest of this book.

Collaboration


Dive into the Laura Rafferty's collaboration.

Top Co-Authors

Avatar

Patrick C. K. Hung

University of Ontario Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Patrick C. K. Hung

University of Ontario Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shih-Chia Huang

National Taipei University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brad Kroese

University of Ontario Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge