Days: Monday, November 25th Tuesday, November 26th Wednesday, November 27th
View this program: with abstractssession overviewtalk overview
09:10 | Privacy Issues in IoT: Healthcare Examples from IoT Devices Perspective (abstract) |
09:50 | An Architecture of Adaptive Cognitive Digital Twins for Resilient Healthcare Infrastructures and Services (abstract) |
10:10 | Safety and Security Risk Assessment in Healthcare and Critical Infrastructures (abstract) |
10:40 | AI for Healthcare Security: The Intersection of Innovation and Resilience (abstract) |
11:20 | 5G Care: Adaptive Authentication Approach for 5G enabled Remote Healthcare Infrastructures (abstract) |
11:40 | A Secure Privacy-Preserving Multimodal Continuous Authentication Protocol for Healthcare Systems (abstract) |
12:00 | Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques (abstract) |
Panelists: Kai Rannenberg (GUF), Jun Zhao (Oxford University), Karen Renaud (University of Strathclyde), Suzanne Prior (Abertay University), Farzana Quayyum (NTNU)
14:00 | Sustainability in IT education: Overview of pedagogical trends |
- CybAlliance (International Alliance for Strengthening Cybersecurity and Privacy in Healthcare)
Sandeep Pirbhulal
- SFI NORCICS (Norwegian Center for Cybersecurity in Critical Sectors)
Sokratis Katsikas/ Vasileios Gkioulos/Habtamu Abie
- EU-CIP (European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection)
Emilia Gugliandolo/Habtamu Abie
What’s new? Exchange of experience on current pedagogical practices
Discussion; open for short presentations.
( All participants )
15:45 | Sustainability reporting: From an auditing concern to an IT concern |
Discussion and suggestions for joint activities
Welcome reception at Læringsarenaen i Nygårdsgaten 5
- Conference opening
-
Welcome message from
-
Steering leader, NIKT
-
Prorector, UiB
-
Leader from Infomedia
-
-
Representatives from Sponsors
-
Mohammad Khalil from Slate
-
-
Lightweight short Poster presentations
-
John Krogstie, NTNU
-
Anastasiia Klimashevskaia, MediaFuture, UiB
-
- Tapas and mingling
View this program: with abstractssession overviewtalk overview
Keynote speaker: Juho Leinonen
09:15 | Generative AI in Computing Education: A Transformative Tool or a Troubling Trend? (abstract) |
10:30 | Verdien av et tverrfaglig semester, slik studentene ser det (abstract) |
11:00 | Role Models as an Intervention for Gender Diversity in Computing Education (abstract) |
11:30 | Using Microsoft Copilot Chat in the Work of IT Educators: Pilot Study (abstract) |
10:30 | Explainable AI (XAI) in a societal citizen perspective – power, conflicts, and ambiguity (abstract) |
10:50 | A Deep-Learning Based Approach for Multi-class Cyberbullying Classification Using Social Media Text and Image Data (abstract) PRESENTER: Israt Tabassum |
11:10 | Kunstig intelligens og kreativitet (abstract) |
11:30 | Managing responsible AI in organizations (abstract) |
11:50 | Algorithmic Profiling in the Workplace: Employee Perceptions and Technostress (abstract) |
10:30 | Automatic 3D Segmentation of Closed Mitral Valve Leaflets on Transesophageal Echocardiogram (abstract) PRESENTER: Maïlys Hau |
11:00 | Automatic Segmentation of Hepatic and Portal Veins using SwinUNETR and Multi-Task Learning (abstract) PRESENTER: Shanmugapriya Survarachakan |
11:30 | Enhancing Cell Detection with Transformer-Based Architectures in Multi-Level Magnification Classification for Computational Pathology (abstract) PRESENTER: Jarl Sondre Sæther |
10:30 | Revisiting FlowGuard: A Critical Examination of the Edge-Based IoT DDoS Defense Mechanism (abstract) PRESENTER: Guru Bhandari |
11:00 | Security Architecture for Distribution System Operators: A Norwegian Perspective (abstract) PRESENTER: Martin Gilje Jaatun |
11:30 | Fuzz Testing of a Wireless Residential Gateway (abstract) PRESENTER: Noah Holmdin |
Keynote speaker: Øystein Haugen
13:00 | Modeling – now more than ever? (abstract) |
14:15 | Trenger vi læringsassistenter? Hvordan kan hverandre-vurdering og/eller egen-vurdering gi god læringsutbytte. (abstract) |
14:45 | Applying Liljedahl’s Thinking Classrooms in a Higher Education Digital Technology Course (abstract) |
15:15 | Programmeringsparadokset etter Sfard og Leron (abstract) |
15:45 | Students' perceptions toward essential functionalities and qualities of peer code assessment tools (abstract) |
16:15 | A Case Study on Student Perspective of Peer Code Review (PCR) (abstract) PRESENTER: Attiqa Rehman |
14:15 | Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning (abstract) |
14:45 | Impact of Emotions on User Behavior Toward Phishing Emails (abstract) PRESENTER: Rebeka Toth |
15:15 | Elevation of MLsec: a security card game for bringing threat modeling to machine learning practitioners (abstract) |
14:15 | remarks - Machinery for Marking Student Work (abstract) |
14:45 | Students as developers of educational tools - What educational challenges do they address and which learning approaches do they implement? (abstract) |
15:15 | OnlineProver: First Experience with Teaching Formal Proofs (abstract) |
15:45 | Improving Fairness and Quality in Master's Thesis Assessment in Norwegian Higher Education (abstract) |
NIK meets Bergen Language Design Laboratory (BLDL): https://conf.researchr.org/home/bldl-15
The program includes a talk from Bjarne Stroustrup
NIK meets Bergen Language Design Laboratory (BLDL): https://conf.researchr.org/home/bldl-15
The program includes a talk from Bjarne Stroustrup
View this program: with abstractssession overviewtalk overview
Keynote speaker: Björn Þór Jónsson
09:00 | On The Importance of Database Techniques for Multimedia Applications (abstract) |
10:15 | Rettferd i variantoppgåver med tilfeldig trekking (abstract) |
10:45 | Automated adaptive testing vs. linear testing in undergraduate mathematics (abstract) |
11:15 | Insights from the Perspective of Examiners on the Justification of Grades in Higher Education in Norway (abstract) |
10:15 | Using Techniques from Neuroscience in Information Systems Modelling Research: A Systematic Mapping Study (abstract) |
10:35 | Information overload – A case study of using an integrated electronic health record system in the emergency room (abstract) PRESENTER: Syed Sajid Hussain |
10:55 | ”It should last long without harming the environment”: perspectives on sustainability in an environmental and historical project (abstract) PRESENTER: John Krogstie |
11:15 | Collective Anomaly Detection in Fisheries (abstract) |
11:35 | VeriDash: An AI-Driven, User-Centric Open Source Dashboard for Enhancing Multimedia Verification (abstract) PRESENTER: Johannes Skivdal |
10:15 | Augmented reality projections as a tool to enrich simulations in health care education: Combining AR projector technology with manikins (abstract) PRESENTER: Aleksander Pedersen |
10:45 | Discovery of endianness and instruction size characteristics in binary programs from unknown instruction set architectures (abstract) PRESENTER: Joachim Andreassen |
11:15 | Understanding Federated Learning from IID to Non-IID dataset: An Experimental Study (abstract) PRESENTER: Jungwon Seo |
11:45 | GluPredKit: Development and User Evaluation of a Standardization Software for Blood Glucose Prediction (abstract) PRESENTER: Miriam Kopperstad Wolff |
10:15 | Information Sharing between the Computer Security Incident Response Team and its Members: An Empirical Study (abstract) PRESENTER: Vilja Steffensen |
10:45 | The Role of Custom Scripting in APT Incident Response (abstract) |
11:15 | From Uncertainty to Prosecution: Enhancing Cyber Resilience through Forensic Readiness (abstract) |
Keynote speaker: Per Thorsheim
13:00 | Why is academia so bad at selling their research, and why is private sector so afraid of cooperating with researchers? (abstract) |
14:15 | The Nordic Prior Knowledge Test in Programming: Motivation, Development and Preliminary Results (abstract) |
14:45 | Fundamentals of Norwegian CS1 (abstract) |
15:15 | Shaping a Modern Programming Paradigms Course for Advanced University Students (abstract) |
15:45 | Students' Visualisations of Programming Concepts: An Exploratory Analysis (abstract) |
14:15 | Restructuring Digital Infrastructures: Architectural Transformation through Sociotechnical Interplay in large-scale incumbent organizations (abstract) PRESENTER: Egil Øvrelid |
14:35 | Enhancing Team Situational Awareness in Crime Scene Investigation through the Use of Head Cameras (abstract) |
14:55 | How do Norwegian enterprises create awareness of cyber security? (abstract) |
15:15 | Extended Reality in critical sectors: Exploring the use cases and challenges (abstract) PRESENTER: Camille Sivelle |
15:35 | The pandemic and the digitalization of Norwegian enterprises (abstract) |
14:15 | Picture This: How Image Filters Affect Trust in Online News (abstract) |
14:45 | Can Large Language Models Support Editors Pick Related News Articles? (abstract) |
15:15 | Exploring the Ethical Challenges of AI and Recommender Systems in the Democratic Public Sphere (abstract) |
15:45 | Evaluating GraphRAG’s Role in Improving Contextual Understanding of News in Newsrooms. (abstract) PRESENTER: Bahareh Fatemi |
14:15 | Continuous Age Detection using Keystroke Dynamics (abstract) |
14:45 | Towards a Framework for the Design of Nonlinear Combiners in Ternary Logic (abstract) |
15:15 | Designing a Decentralized Identity Verification Platform (abstract) |
15:45 | End-User Privacy, Security, and Data Ownership Concerns on the Helsenorge Platform: A Mixed-Methods Study (abstract) PRESENTER: Abha Pokharel |