Johan F. Hoorn1 Off-line Design of a Handheld Security Monitor HandSeM Faculty of Sciences Division of Mathematics and Computer Science Department of Information.

Slides:



Advertisements
Similar presentations
True Business-Class Remote Online Backup 44% Of All Computer Users Have Reported At Least One Permanent Data Loss Your Business Data IS Your Business –
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Windows Basics An Introduction to the Windows Operating System.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Johnson Logistics Solutions Office of Systems and Information Technology.
REVIEW FOR SOME WELCOME TO THE COMPUTER!. WHY ARE COMPUTERS IMPORTANT?
Comp 6620: User Interface Design and Evaluation Homework #4: Alabama Uniform Traffic Crash Report Francisco Arcediano
Welcome to the Ivy Tech Community College Online Employment System Applicant Tutorial.
1 Welcome to the Colgate University Online Employment System Applicant Tutorial.
Basic Computer Skills Seminar
Welcome to the Computer!
Simple Computer Maintenance. Common Computer Clean up Tasks Disk Clean – up Anti-virus scan Deleting Cookies.
Spy Camera in USA Buy Spy Camera in USA, Wireless Camera, Mobile Jammers, Spy Audio Devices, Spy GPS Trackers, Mobile Watch Phone, Spy Gadgets Spy Gadgets.
GV-Control Center Overview
Network Security in a Business Setting By: Brian Haumschild.
Welcome to the University of West Florida Online Employment System Applicant Tutorial.
Computer Education for Elementary School Students: Teacher’s Training SSRVM 2007.
MULTIMEDIA What is Multimedia? The word MULTIMEDIA is made up from two words, MULTI meaning more than one and MEDIA meaning a way of displaying or passing.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Practical PC, 7th Edition Chapter 2: Working with Windows
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
SMART TABLET For Education (E-Learning) Ph: Learning ZTAB for Company / School / College / Society /
Windows Management Computer Literacy 1 Transition Plus Services.
GEN IV IP NVR Setup And Instructions. Playback Recordings 1)Click and select your device 2)Select Camera in next box a) To select more then one camera.
Guide to MCSE , Enhanced 1 Activity 2-1: Exploring Device Manager Objective is to explore the use of Device Manager View properties of existing hardware.
. The Broadband Access Project (BAP) is funded by a $2.84 million dollar grant from the U.S. Department of Commerce, (Award #27-42-B10003) and a $740 thousand.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Empowering Education1 Product Presentation.
Computers: Tools for an Information Age Chapter 1.
Overview What is Windows 8? What are some new features of Windows 8? Availability. Critics and Effects to people’s lives.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 2 Looking at Windows. 2Practical PC 5 th Edition Chapter 2 Getting Started In this Chapter, you will learn: − Which version of Windows you own.
Networks.
How To Log On the Computer At School A Tutorial for Preschoolers and Kindergarteners.
E.g.: MS-DOS interface. DIR C: /W /A:D will list all the directories in the root directory of drive C in wide list format. Disadvantage is that commands.
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
SIMSWeb “Internet Remote Access” The most advanced central station software in the universe !
Introduction to Windows 10 Windsor Senior Computer Users Group October 12, 2015.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Computer Parts and Functions. How A Computer Works.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Welcome to Westford Academy 8 th grade Parent Night.
Agenda AR500X and AR550X End of Life (EOL) Information
Physical Security Concerns for LAN Management By: Derek McQuillen.
Windows Vista Configuration MCTS : Mobile Computers.
Exploring Microsoft Windows 8 Chapter 1 Getting Started with Windows 8 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Software Overview How to… Review Video and Data  Review the Journal Review the Journal  Simple Search Simple Search  Advanced Search Advanced Search.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
This presentation uses a free template provided by FPPT.com Using Tools in Kaspersky Internet Security 2017.
AUTOMATED security system
Chapter 2 Looking at Windows
Information Architecture
AUTOMATED security system
Narration by Bill Roth, Voice of the Hokies
IT Services for Students Community College of Rhode Island
IT Services for Students Community College of Rhode Island
Get best assistance for HP Printer Australia Dial
Windows 7                      .
This is a typical Windows user desktop
Network Hardware and Protocols
Online software and backups
Network hardening Chapter 14.
Windows Operating System
An Introduction to the Windows Operating System
Presentation transcript:

Johan F. Hoorn1 Off-line Design of a Handheld Security Monitor HandSeM Faculty of Sciences Division of Mathematics and Computer Science Department of Information Management and Software Engineering  2002

Johan F. Hoorn2 CASE # 1 At 1:24 a.m. March 18,1990 as St. Patrick's Day came to a close thieves struck the Isabella Stewart Gardner Museum in Boston MA. The biggest art theft in U.S. history remains unsolved. A five million dollar reward has been offered for the safe return of the art. Although statutes for criminal prosecution may have lapsed, the paintings are still considered to be stolen property. The most valuable painting taken is Jan Vermeer's "The Concert". It is one of approx. 35 known works by the great Dutch painter. If you have any information about this case please contact the appropriate officials MAJOR ART THEFTS "A Search For The World's Most Wanted Art" We are seeking information about these cases: 1. The Vanishing Vermeer $5,000,000 reward Boston, MA USA Gardner Museum March 18, 1990$5,000,000 reward

Johan F. Hoorn3 Off-line Design of a Handheld Security Monitor HandSeM Frame from diskette filing box Off-line Design of a Handheld Security Monitor HandSeM Alarm How to select alarm sector? - touchscreens? - pointer? - extra buttons? - or combine? Wireless connection to surveillance cameras

Johan F. Hoorn4 Off-line Design of a Handheld Security Monitor HandSeM Frame from address file box Off-line Design of a Handheld Security Monitor HandSeM Wireless connection to surveillance cameras How to identify the user? Alarm - fingerprints? - eye scan? - handwriting? (neural net) Guard’s name - virtual keyboard?  QWERTYUIOP ASDFGHJKL ZXCVBNM

Johan F. Hoorn5 Off-line Design of a Handheld Security Monitor HandSeM Off-line Design of a Handheld Security Monitor HandSeM How to identify the user? - fingerprints? - eye scan? - handwriting? (neural net) - palm print? (on the back) - virtual keyboard?

Johan F. Hoorn6 Off-line Design of a Handheld Security Monitor HandSeM Off-line Design of a Handheld Security Monitor HandSeM How to switch if there are eight sectors? Alarm Guard’s name - touchscreens? - pointer? - extra buttons? - automatic? REWARD

Johan F. Hoorn7 Off-line Design of a Handheld Security Monitor HandSeM Off-line Design of a Handheld Security Monitor HandSeM How to switch if there are eight sectors? - touchscreens? - pointer? - extra buttons? - automatic? - or use back side? REWARD

Johan F. Hoorn8 Off-line Design of a Handheld Security Monitor HandSeM Off-line Design of a Handheld Security Monitor HandSeM How to take notes? REWARD - speech? Alarm - write? Saw suspect  QWERTYUIOP ASDFGHJKL ZXCVBNM - virtual keyboard?

Johan F. Hoorn9 Off-line Design of a Handheld Security Monitor HandSeM Off-line Design of a Handheld Security Monitor HandSeM REWARD Alarm I run to back - wireless, continuous, and on-line? How to transmit data? - docking station?

Johan F. Hoorn10 Off-line Design of a Handheld Security Monitor HandSeM - or use the floppy drive?

Johan F. Hoorn11 Exercise: Design HandSeM from the options just presented  Provide the most functionality with the least number of buttons and gadgets  Avoid buttons or options with multiple functions  Operation of device should be intuitively clear  Play a scenario to explore the user tasks

Johan F. Hoorn12 System requirements (and possible solutions)  Selection of alarm sector (touchscreen, pointer, extra buttons, or a combination?)  User ID (fingerprint, eye scan, handwriting, virtual keyboard, palm print?)  Monitor > 4 sectors (touchscreen, pointer, extra buttons, automatic, back side of device?)  Make notes or log (speech, write, virtual keyboard?)  Transmit data (wireless, continuous, on-line, docking station, 3½ floppy drive?)

Johan F. Hoorn13 First usability test by playing scenario’s: What functionality is (not) needed?  Guard is alone and taken hold of by art thief  Guard is in late-night firefight and wants back-up  Guard works while public is in museum  Colleagues bring together a search posse