SlideShare a Scribd company logo
1 of 26
Download to read offline
Usable Trust in the 
Internet of Things
Peter Wolkerstorfer – CURE


Effectsplus 2nd Cluster Event 
(July 4th & 5th 2011, VU University, Amsterdam)
Agenda

• Introduction
• Scenarios
• Personas
• Requirements
• Outlook
3




Introduction
4




              uTRUSTit Project  facts
Project duration:    3 years
Project funding:     EU 7th Framework Programme 
                     ICT‐2009.1.4

Project coordinator: CURE – Center for Usability 
                     Research & Engineering

Contact:             http://www.utrustit.eu
                     utrustit@cure.at
5




The uTRUSTit Consortium
6




CURE – Center for Usability Research & 
Engineering
• Independent Research Center with 30 Researchers
• Interdisciplinary Research
➥Psychology, Sociology, Industrial‐ & Media‐Design, Informatics, 
 etc.
• Main Research Areas
➥Usability and User Experience Research, Requirements 
 Engineering, Prototyping und User Interface Design / User‐
 Centred Design, Lab & Field Evaluations (Focus on Technology 
 Acceptance), HCISEC & Privacy
7




uTRUSTit 
Overview
8




Usable Trust in the IoT

• What is it?
➥Trust as a decision‐basis for end‐users
  ➥“informed decisions”
➥Trust feedback mechanisms which are accepted by end‐users
• How to achieve?
➥User‐centric design process
  ➥Personas
  ➥Requirements engineering
9




Scenarios
10




Scenarios

• Smart Home
• Image right: Door 
  lock system, 
                       Das Bild
                       k ann zurz…




  Medicine cabinet 
  & Media Center


• Smart Office

• E‐Voting
11




Personas
12
Personas ‐ What are 
Personas?
13
Personas ‐ What are 
Personas?

 “...a hypothetical archetype of real users 
 described in great detail and defined by 
 their goals and needs, rather than just 
 demographics.”
                         Lindgren et al. (2007)
14
      Personas ‐ Why 
      Personas?


• Rise developers‘ empathy for end‐users
➥Know for whom artefacts are developed
• Consolidate the individual pictures from an abstract „the 
  user“ to one concrete set of personas
➥Prevents “bending” of user definitions & projections 
• Nearly none‐intrusive method
➥Development‐style agnostic
15




Anna Janssen
16




Sara Moser
17




The Clasens
18




David Clasen
19




Paul Clasen
20




Fredrik Clasen
21
Personas –
Marketing
22




Requirements
23




Requirements for Usable Trust
• 3‐folded requirements
➥Technical requirements
➥Requirements for VR
➥User‐requirements
  ➥Method: focus groups + usability heuristics + questionnaires
   (questionnaires related to the scenarios; elicit attitudes 
   towards privacy, technology and trust)
  ➥3 focus groups, 23 Participants 
   (9 female / 14 male; age 27y‐67y; av. age = 41,73, STD=14,8)
24




User‐ Requirements Examples
• A device should provide feedback if third parties are able to read 
  data during entry and transmission.
• The look and feel of a software or user interface should be 
  consistent even among various devices.
• The adoption from IoT in daily life must be eco‐friendly and 
  environmentally friendly.
• Security and privacy functions should be pre‐configured in a 
  meaningful way. Users should be able to choose from pre‐defined 
  policies which reflect common sense over the micro management 
  of all policies for all use cases.
25




Outlook

• Complexity 
  reduction
• Trust research
• Mental model 
  research

                   Image source: http://www.boxesandarrows.com/
26




               Thank you for your attention!

                                   Questions?



                                  http://www.utrustit.eu/




                                    @
Peter Wolkerstorfer – wolkerstorfer    cure.at

More Related Content

Viewers also liked

Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meetingfcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 

Viewers also liked (17)

Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Tdl
TdlTdl
Tdl
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Nessos
NessosNessos
Nessos
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of Things
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 

Similar to Usable Trust in the Internet of Things

ChemnitzDec2014.key.compressed
ChemnitzDec2014.key.compressedChemnitzDec2014.key.compressed
ChemnitzDec2014.key.compressedBrian Fisher
 
ZenonFest19may2016.key
ZenonFest19may2016.keyZenonFest19may2016.key
ZenonFest19may2016.keyBrian Fisher
 
Crowdsourced biological science - edinburgh
Crowdsourced biological science - edinburghCrowdsourced biological science - edinburgh
Crowdsourced biological science - edinburghErinma Ochu
 
Designing Useful and Usable Augmented Reality Experiences
Designing Useful and Usable Augmented Reality Experiences Designing Useful and Usable Augmented Reality Experiences
Designing Useful and Usable Augmented Reality Experiences Yan Xu
 
Keeping your customers real
Keeping your customers realKeeping your customers real
Keeping your customers realProgress UX
 
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden Insights
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden InsightsUXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden Insights
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden InsightsUXPA International
 
Interaction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsInteraction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsDavid Little
 
Data-driven UX: What it really takes and how to get there
Data-driven UX: What it really takes and how to get thereData-driven UX: What it really takes and how to get there
Data-driven UX: What it really takes and how to get thereEmmanuelle Boloix, Ph.D.
 
User Experience & Visitor Experience: How to Improve Museum Apps
User Experience & Visitor Experience: How to Improve Museum AppsUser Experience & Visitor Experience: How to Improve Museum Apps
User Experience & Visitor Experience: How to Improve Museum AppsCentralis
 
A Pragmatic Perspective on Software Visualization
A Pragmatic Perspective on Software VisualizationA Pragmatic Perspective on Software Visualization
A Pragmatic Perspective on Software VisualizationArie van Deursen
 
Presentation of Software Study at IDI/NTNU
Presentation of Software Study at IDI/NTNUPresentation of Software Study at IDI/NTNU
Presentation of Software Study at IDI/NTNUletiziajaccheri
 
Designing Better Experiences - UX London 2013
Designing Better Experiences - UX London 2013Designing Better Experiences - UX London 2013
Designing Better Experiences - UX London 2013Cyber-Duck
 
Ethnography in Software Design - An Anthropologist's Perspective
Ethnography in Software Design - An Anthropologist's PerspectiveEthnography in Software Design - An Anthropologist's Perspective
Ethnography in Software Design - An Anthropologist's PerspectiveKelly Moran
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Robert Stribley
 

Similar to Usable Trust in the Internet of Things (20)

ChemnitzDec2014.key.compressed
ChemnitzDec2014.key.compressedChemnitzDec2014.key.compressed
ChemnitzDec2014.key.compressed
 
Chemnitz dec2014
Chemnitz dec2014Chemnitz dec2014
Chemnitz dec2014
 
ZenonFest19may2016.key
ZenonFest19may2016.keyZenonFest19may2016.key
ZenonFest19may2016.key
 
Crowdsourced biological science - edinburgh
Crowdsourced biological science - edinburghCrowdsourced biological science - edinburgh
Crowdsourced biological science - edinburgh
 
Designing Useful and Usable Augmented Reality Experiences
Designing Useful and Usable Augmented Reality Experiences Designing Useful and Usable Augmented Reality Experiences
Designing Useful and Usable Augmented Reality Experiences
 
Keeping your customers real
Keeping your customers realKeeping your customers real
Keeping your customers real
 
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden Insights
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden InsightsUXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden Insights
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden Insights
 
Interaction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital productsInteraction design: desiging user interfaces for digital products
Interaction design: desiging user interfaces for digital products
 
Data-driven UX: What it really takes and how to get there
Data-driven UX: What it really takes and how to get thereData-driven UX: What it really takes and how to get there
Data-driven UX: What it really takes and how to get there
 
User Experience & Visitor Experience: How to Improve Museum Apps
User Experience & Visitor Experience: How to Improve Museum AppsUser Experience & Visitor Experience: How to Improve Museum Apps
User Experience & Visitor Experience: How to Improve Museum Apps
 
A Pragmatic Perspective on Software Visualization
A Pragmatic Perspective on Software VisualizationA Pragmatic Perspective on Software Visualization
A Pragmatic Perspective on Software Visualization
 
UTS CIC2 Briefing, 17 June 2016
UTS CIC2 Briefing, 17 June 2016UTS CIC2 Briefing, 17 June 2016
UTS CIC2 Briefing, 17 June 2016
 
ICS2208 Lecture 5
ICS2208 Lecture 5ICS2208 Lecture 5
ICS2208 Lecture 5
 
Presentation of Software Study at IDI/NTNU
Presentation of Software Study at IDI/NTNUPresentation of Software Study at IDI/NTNU
Presentation of Software Study at IDI/NTNU
 
Designing Better Experiences - UX London 2013
Designing Better Experiences - UX London 2013Designing Better Experiences - UX London 2013
Designing Better Experiences - UX London 2013
 
ICS2208 Lecture2
ICS2208 Lecture2ICS2208 Lecture2
ICS2208 Lecture2
 
Inclusion and Accessibility: UX Put into Practice
Inclusion and Accessibility: UX Put into PracticeInclusion and Accessibility: UX Put into Practice
Inclusion and Accessibility: UX Put into Practice
 
uTRUSTit Short Summary
uTRUSTit Short SummaryuTRUSTit Short Summary
uTRUSTit Short Summary
 
Ethnography in Software Design - An Anthropologist's Perspective
Ethnography in Software Design - An Anthropologist's PerspectiveEthnography in Software Design - An Anthropologist's Perspective
Ethnography in Software Design - An Anthropologist's Perspective
 
Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18Introduction to User Experience Design 12/08/18
Introduction to User Experience Design 12/08/18
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Usable Trust in the Internet of Things