History of encryption, technology theory
Open encryption technology: A contribution to a meso-level analysis of 'technical' factors
(First Nordic STS Conference, Trondheim, 2013),
Open encryption technology and social movements
(Cryptologic History Symposium, Maryland, 2013)
discuss the development of encryption technology in the 1990s.
They ask how open and strong encryption became the
as exemplified by the standardization in 2001 of
the Rijndael encryption algorithm
and the selection of open algorithms for the GSM 3rd Generation project in 1999.
This was a shift in paradigm in comparison to
the weak and closed or semi-closed encryption algorithms,
such as DES, that dominated in the 80s and 90s.
Currently I am studying the Chaos Computer Club's
of a GSM mobile phone in 1998,
and how it contributed to the paradigm shift.
Electric vehicle design,
co-authored with Thomas Budde Christensen and published
in Simonsen et al. (Eds)
Situated Design Methods
(MIT Press, 2014),
studies how electric vehicles are developed using a hybrid design method,
with iterative and phased elements, and whether this is an obstacle
to electric vehicle proliferation.
On the one hand, a phased approach, where design completion
precedes the construction of an automated production plant,
is required for lowering the sales price of a new electric vehicle,
in the same was as for ordinary combustion engine cars.
On the other hand, this requires planning for years ahead.
The paper's case study of the Renault Fluence E.V. indicates
that the car's battery swifting technology became
obsolete already a year after the launch of the car,
as indicated by the bankrupcy in 2013 of Better Place,
the company that was supposed to carry that technology to market.
Exemplary learning in design studies
in Lone Krog, Annie Aarup Jensen (eds)
Visions, Challenges and Strategies for Problem-Based Learning
discusses strengths and limits of applying Wagenschein
and Negt's theories of exemplary learning to design
At the humtek bachelor program, I teach the course "Technological Systems and Artefacts".
The course introduces to the technical dimension
of humtek. The course is taught at the first semester at humtek.
Computer Science and Informatics
At Computer Science and Informatics, my main tasks are teaching and supervising student projects
related to security.