Days: Monday, November 25th Tuesday, November 26th Wednesday, November 27th
View this program: with abstractssession overviewtalk overview
| 09:10 | Privacy Issues in IoT: Healthcare Examples from IoT Devices Perspective (abstract) | 
| 09:50 | An Architecture of Adaptive Cognitive Digital Twins for Resilient Healthcare Infrastructures and Services (abstract) | 
| 10:10 | Safety and Security Risk Assessment in Healthcare and Critical Infrastructures (abstract) | 
| 10:40 | AI for Healthcare Security: The Intersection of Innovation and Resilience (abstract) | 
| 11:20 | 5G Care: Adaptive Authentication Approach for 5G enabled Remote Healthcare Infrastructures (abstract) | 
| 11:40 | A Secure Privacy-Preserving Multimodal Continuous Authentication Protocol for Healthcare Systems (abstract) | 
| 12:00 | Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques (abstract) | 
Panelists: Kai Rannenberg (GUF), Jun Zhao (Oxford University), Karen Renaud (University of Strathclyde), Suzanne Prior (Abertay University), Farzana Quayyum (NTNU)
| 14:00 | Sustainability in IT education: Overview of pedagogical trends  | 
- CybAlliance (International Alliance for Strengthening Cybersecurity and Privacy in Healthcare)
Sandeep Pirbhulal
- SFI NORCICS (Norwegian Center for Cybersecurity in Critical Sectors)
Sokratis Katsikas/ Vasileios Gkioulos/Habtamu Abie
- EU-CIP (European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection)
Emilia Gugliandolo/Habtamu Abie
What’s new? Exchange of experience on current pedagogical practices
Discussion; open for short presentations.
( All participants )
| 15:45 | Sustainability reporting: From an auditing concern to an IT concern  | 
Discussion and suggestions for joint activities
Welcome reception at Læringsarenaen i Nygårdsgaten 5
- Conference opening
- 
	Welcome message from - 
		Steering leader, NIKT 
- 
		Prorector, UiB 
- 
		Leader from Infomedia 
 
- 
		
- 
	Representatives from Sponsors - 
		Mohammad Khalil from Slate 
 
- 
		
- 
	Lightweight short Poster presentations - 
		John Krogstie, NTNU 
- 
		Anastasiia Klimashevskaia, MediaFuture, UiB 
 
- 
		
- Tapas and mingling
View this program: with abstractssession overviewtalk overview
Keynote speaker: Juho Leinonen
| 09:15 | Generative AI in Computing Education: A Transformative Tool or a Troubling Trend? (abstract) | 
| 10:30 | Verdien av et tverrfaglig semester, slik studentene ser det (abstract) | 
| 11:00 | Role Models as an Intervention for Gender Diversity in Computing Education (abstract)   | 
| 11:30 | Using Microsoft Copilot Chat in the Work of IT Educators: Pilot Study (abstract) | 
| 10:30 | Explainable AI (XAI) in a societal citizen perspective – power, conflicts, and ambiguity (abstract) | 
| 10:50 | A Deep-Learning Based Approach for Multi-class Cyberbullying Classification Using Social Media Text and Image Data (abstract)   PRESENTER: Israt Tabassum | 
| 11:10 | Kunstig intelligens og kreativitet (abstract) | 
| 11:30 | Managing responsible AI in organizations (abstract) | 
| 11:50 | Algorithmic Profiling in the Workplace: Employee Perceptions and Technostress (abstract) | 
| 10:30 | Automatic 3D Segmentation of Closed Mitral Valve Leaflets on Transesophageal Echocardiogram (abstract) PRESENTER: Maïlys Hau | 
| 11:00 | Automatic Segmentation of Hepatic and Portal Veins using SwinUNETR and Multi-Task Learning (abstract) PRESENTER: Shanmugapriya Survarachakan | 
| 11:30 | Enhancing Cell Detection with Transformer-Based Architectures in Multi-Level Magnification Classification for Computational Pathology (abstract) PRESENTER: Jarl Sondre Sæther | 
| 10:30 | Revisiting FlowGuard: A Critical Examination of the Edge-Based IoT DDoS Defense Mechanism (abstract)     PRESENTER: Guru Bhandari | 
| 11:00 | Security Architecture for Distribution System Operators: A Norwegian Perspective (abstract) PRESENTER: Martin Gilje Jaatun | 
| 11:30 | Fuzz Testing of a Wireless Residential Gateway (abstract) PRESENTER: Noah Holmdin | 
Keynote speaker: Øystein Haugen
| 13:00 | Modeling – now more than ever? (abstract) | 
| 14:15 | Trenger vi læringsassistenter? Hvordan kan hverandre-vurdering og/eller egen-vurdering gi god læringsutbytte. (abstract) | 
| 14:45 | Applying Liljedahl’s Thinking Classrooms in a Higher Education Digital Technology Course (abstract) | 
| 15:15 | Programmeringsparadokset etter Sfard og Leron (abstract) | 
| 15:45 | Students' perceptions toward essential functionalities and qualities of peer code assessment tools (abstract) | 
| 16:15 | A Case Study on Student Perspective of Peer Code Review (PCR) (abstract) PRESENTER: Attiqa Rehman | 
| 14:15 | Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning (abstract) | 
| 14:45 | Impact of Emotions on User Behavior Toward Phishing Emails (abstract)   PRESENTER: Rebeka Toth | 
| 15:15 | Elevation of MLsec: a security card game for bringing threat modeling to machine learning practitioners (abstract)   | 
| 14:15 | remarks - Machinery for Marking Student Work (abstract) | 
| 14:45 | Students as developers of educational tools - What educational challenges do they address and which learning approaches do they implement? (abstract) | 
| 15:15 | OnlineProver: First Experience with Teaching Formal Proofs (abstract) | 
| 15:45 | Improving Fairness and Quality in Master's Thesis Assessment in Norwegian Higher Education (abstract) | 
NIK meets Bergen Language Design Laboratory (BLDL): https://conf.researchr.org/home/bldl-15
The program includes a talk from Bjarne Stroustrup
NIK meets Bergen Language Design Laboratory (BLDL): https://conf.researchr.org/home/bldl-15
The program includes a talk from Bjarne Stroustrup
View this program: with abstractssession overviewtalk overview
Keynote speaker: Björn Þór Jónsson
| 09:00 | On The Importance of Database Techniques for Multimedia Applications (abstract) | 
| 10:15 | Rettferd i variantoppgåver med tilfeldig trekking (abstract) | 
| 10:45 | Automated adaptive testing vs. linear testing in undergraduate mathematics (abstract) | 
| 11:15 | Insights from the Perspective of Examiners on the Justification of Grades in Higher Education in Norway (abstract) | 
| 10:15 | Using Techniques from Neuroscience in Information Systems Modelling Research: A Systematic Mapping Study (abstract) | 
| 10:35 | Information overload – A case study of using an integrated electronic health record system in the emergency room (abstract)   PRESENTER: Syed Sajid Hussain | 
| 10:55 | ”It should last long without harming the environment”: perspectives on sustainability in an environmental and historical project (abstract) PRESENTER: John Krogstie | 
| 11:15 | Collective Anomaly Detection in Fisheries (abstract) | 
| 11:35 | VeriDash: An AI-Driven, User-Centric Open Source Dashboard for Enhancing Multimedia Verification (abstract)   PRESENTER: Johannes Skivdal | 
| 10:15 | Augmented reality projections as a tool to enrich simulations in health care education: Combining AR projector technology with manikins (abstract) PRESENTER: Aleksander Pedersen | 
| 10:45 | Discovery of endianness and instruction size characteristics in binary programs from unknown instruction set architectures (abstract) PRESENTER: Joachim Andreassen | 
| 11:15 | Understanding Federated Learning from IID to Non-IID dataset: An Experimental Study (abstract) PRESENTER: Jungwon Seo | 
| 11:45 | GluPredKit: Development and User Evaluation of a Standardization Software for Blood Glucose Prediction (abstract) PRESENTER: Miriam Kopperstad Wolff | 
| 10:15 | Information Sharing between the Computer Security Incident Response Team and its Members: An Empirical Study (abstract)   PRESENTER: Vilja Steffensen | 
| 10:45 | The Role of Custom Scripting in APT Incident Response (abstract) | 
| 11:15 | From Uncertainty to Prosecution: Enhancing Cyber Resilience through Forensic Readiness (abstract)   | 
Keynote speaker: Patrick Adrianus Bours
| 13:00 | Using Behavioural Biometrics beyond Gaining Access (abstract) | 
| 14:15 | The Nordic Prior Knowledge Test in Programming: Motivation, Development and Preliminary Results (abstract) | 
| 14:45 | Fundamentals of Norwegian CS1 (abstract) | 
| 15:15 | Shaping a Modern Programming Paradigms Course for Advanced University Students (abstract) | 
| 15:45 | Students' Visualisations of Programming Concepts: An Exploratory Analysis (abstract) | 
| 14:15 | Restructuring Digital Infrastructures: Architectural Transformation through Sociotechnical Interplay in large-scale incumbent organizations (abstract) PRESENTER: Egil Øvrelid | 
| 14:35 | Enhancing Team Situational Awareness in Crime Scene Investigation through the Use of Head Cameras (abstract) | 
| 14:55 | How do Norwegian enterprises create awareness of cyber security? (abstract) | 
| 15:15 | Extended Reality in critical sectors: Exploring the use cases and challenges (abstract) PRESENTER: Camille Sivelle | 
| 15:35 | The pandemic and the digitalization of Norwegian enterprises (abstract) | 
| 14:15 | Picture This: How Image Filters Affect Trust in Online News (abstract) | 
| 14:45 | Can Large Language Models Support Editors Pick Related News Articles? (abstract) | 
| 15:15 | Exploring the Ethical Challenges of AI and Recommender Systems in the Democratic Public Sphere (abstract) | 
| 15:45 | Evaluating GraphRAG’s Role in Improving Contextual Understanding of News in Newsrooms. (abstract) PRESENTER: Bahareh Fatemi | 
| 14:15 | Continuous Age Detection using Keystroke Dynamics (abstract) | 
| 14:45 | Towards a Framework for the Design of Nonlinear Combiners in Ternary Logic (abstract) | 
| 15:15 | Designing a Decentralized Identity Verification Platform (abstract) | 
| 15:45 | End-User Privacy, Security, and Data Ownership Concerns on the Helsenorge Platform: A Mixed-Methods Study (abstract) PRESENTER: Abha Pokharel |