Auflistung nach Schlagwort "Trust"
1 - 10 von 23
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelAgreement Computing(KI - Künstliche Intelligenz: Vol. 25, No. 1, 2011) Sierra, Carles; Botti, Vicent; Ossowski, SaschaIn this paper we introduce the concept of Agreement Computing, motivate the central role that the concept of agreement plays in open software systems and discuss a number of research challenges that need to be addressed to make the agreement computing vision a reality.
- TextdokumentAutomated Monitoring of Operational Technology Security and Compliance for Power Grids(GI SICHERHEIT 2022, 2022) Fraune, BastianIT security standards can increase trust in a system or component if compliance to the standard can be proven to third parties. Those standards usually specify requirements for security features, which then lead to a certain configuration of an industrial control system. Continuous monitoring of IT security configurations on intelligent electronic devices is difficult because there is no standardised way to query the security configurations of those devices. The objective of this PhD project is to enable automatic querying of security settings from industrial control system in the use case of the power grid infrastructure for remote monitoring. This opens up the possibility of automatically comparing the actual security state on the device against the defined IT security standard configurations. In such cases, industrial control systems that do not comply with defined security standards can thus be identified directly by monitoring systems in the control centre.
- KonferenzbeitragCollaborating in a Crisis: Perspectives on Trust and Technological Framework in Organising a COVID-19 Online Hackathon(Mensch und Computer 2022 - Tagungsband, 2022) Karhu, Mari; Karampela, Maria; Häkkilä, JonnaThis paper explores trust in online-only-collaboration, where a team was gathered to organise a COVID-19 online hackathon with only three days notice. The study is based on the thematic analysis of ten in-depth interviews with the hackathon organisers. The findings report how trust among the organisers was encapsulated in 1) the shared big goal, 2) the significance of real-life networks, 3) a strong lead organiser on the collaboration forming on the fly, and 4) the lack of face-to-face contact in relation to becoming familiar or staying unknown. Technology related findings showed that the collaboration platforms were selected based on familiarity and ease of use. The chosen communication channels created a split between age groups, and transparency of the communication suffered somewhat from one-to-one communications in the background and divided application use. However, trust between the organisers helped them to overcame the transparency challenges. The findings are applicable to societal crisis situations in which technologies are used to build collaboration in aim to address shared challenges.
- ZeitschriftenartikelDie Rolle der Kultur in der Selbstoffenbarung und Privatsphäre in sozialen Onlinenetzwerken(Wirtschaftsinformatik: Vol. 54, No. 3, 2012) Krasnova, Hanna; Veltri, Natasha F.; Günther, OliverSoziale Onlinenetzwerke (SON) stützen sich ausschließlich auf nutzergenerierten Inhalt um ihren Mitgliedern ein ansprechendes und lohnendes Erlebnis zu bieten. Infolgedessen sind die Belebung der Kommunikation zwischen Nutzern sowie die Stimulierung ihrer Selbstoffenbarung im Netz unerlässlich für die Zukunftsfähigkeit von SON. Soziale Netzwerke sind weltweit beliebt und deren Nutzer werden zunehmend kulturell vielfältiger. Um ihre Mitglieder zu motivieren Informationen zu teilen bedarf es des Verständnisses kultureller Feinheiten. Bisher bietet die derzeitige Forschung nur begrenzte Einblicke in die Rolle der Kultur, die hinter dieser Bereitwilligkeit von Selbstoffenbarung der Nutzer in Onlinenetzwerken steht. Aufbauend auf dem Privatsphärekalkül untersucht diese Studie die Rolle zweier kultureller Dimensionen – Individualismus und Unsicherheitsvermeidung – bei der Selbstoffenbarung auf SON. Die Umfrageergebnisse deutscher und amerikanischer Facebook-Nutzer bilden hierbei die Basis für die Analyse. Die Resultate des Strukturgleichungsmodells und der Multi-Gruppen-Analyse offenbaren deutliche Unterschiede in den kognitiven Strukturen dieser beiden Kulturen. Hierbei spielen Vertrauensannahmen eine entscheidende Rolle bei der Selbstoffenbarung von Nutzern mit individualistischem Hintergrund. Gleichzeitig beeinflusst die Unsicherheitsvermeidung die Auswirkung von den Bedenken hinsichtlich der Privatsphäre. Der Beitrag der Autoren zu der Theorie ist die Ablehnung des universellen Charakters des Privatsphärekalküls. Die Forschungsergebnisse geben den Betreibern von SON eine Reihe von Empfehlungen, um die Erstellung und Teilung von Inhalten ihrer heterogenen Zielgruppen zu stimulieren.AbstractSocial Network Sites (SNSs) rely exclusively on user-generated content to offer engaging and rewarding experience to its members. As a result, stimulating user communication and self-disclosure is vital for the sustainability of SNSs. However, considering that the SNS users are increasingly culturally diverse, motivating this audience to self-disclose requires understanding of their cultural intricacies. Yet existing research offers only limited insights into the role of culture behind the motivation of SNS users to self-disclose. Building on the privacy calculus framework, this study explores the role of two cultural dimensions – individualism and uncertainty avoidance – in self-disclosure decisions of SNS users. Survey responses of US and German Facebook members are used as the basis for our analysis. Structural equation modeling and multi-group analysis results reveal the distinct role of culture in the cognitive patterns of SNS users. The authors find that trusting beliefs play a key role in the self-disclosure decisions of users from individualistic cultures. At the same time, uncertainty avoidance determines the impact of privacy concerns. This paper contributes to the theory by rejecting the universal nature of privacy calculus processes. The findings provide for an array of managerial implications for SNS providers as they strive to encourage content creation and sharing by their heterogeneous members.
- ZeitschriftenartikelDistributed ascending proxy auction — A cryptographic approach(Wirtschaftsinformatik: Vol. 48, No. 1, 2006) Rolli, Daniel; Conrad, Michael; Neumann, Dirk; Sorge, ChristophIn recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures. In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic algorithms. In essence, the auction protocol has the capability of preserving the privacy of the winning bidder’s true valuation.The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group. This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach does not require bidders to be online unless they are submitting their bid chain to the auctioneers.
- ZeitschriftenartikelFair AI(Business & Information Systems Engineering: Vol. 62, No. 4, 2020) Feuerriegel, Stefan; Dolata, Mateusz; Schwabe, Gerhard
- ZeitschriftenartikelIn Stars We Trust – A Note on Reputation Portability Between Digital Platforms(Business & Information Systems Engineering: Vol. 64, No. 3, 2021) Hesse, Maik; Teubner, Timm; Adam, Marc T. P.Complementors accumulate reputation on an ever-increasing number of online platforms. While the effects of reputation within individual platforms are well-understood, its potential effectiveness across platform boundaries has received much less attention. This research note considers complementors’ ability to increase their trustworthiness in the eyes of prospective consumers by importing reputational data from another platform. The study evaluates this potential lever by means of an online experiment, during which specific combinations of on-site and imported rating scores are tested. Results reveal that importing reputation can be advantageous – but also detrimental, depending on ratings’ values. Implications for complementors, platform operators, and regulatory bodies concerned with online reputation are considered.
- ZeitschriftenartikelInteractive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms(Business & Information Systems Engineering: Vol. 60, No. 4, 2018) Sänger, Johannes; Pernul, GüntherEarly reputation systems use simple computation metrics that can easily be manipulated by malicious actors. Advanced computation models that mitigate their weaknesses, however, are non-transparent to the end-users thus lowering their understandability and the users’ trust towards the reputation system. The paper proposes the concept of interactive reputation systems that combine the cognitive capabilities of the user with the advantages of robust metrics while preserving the system’s transparency. Results of the evaluation show that interactive reputation systems increase both the users’ detection ability (robustness) and understanding of malicious behavior while avoiding trade-offs in usability.
- editorialIntroduction to this Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems”(i-com: Vol. 15, No. 3, 2016) Mentler, Tilo; Reuter, Christian; Geisler, StefanMission- and safety-critical domains are more and more characterized by interactive and multimedia systems varying from large-scale technologies (e. g. airplanes) to wearable devices (e. g. smartglasses) operated by professional staff or volunteering laypeople. While technical availability, reliability and security of computer-based systems are of utmost importance, outcomes and performances increasingly depend on sufficient human-machine interaction or even cooperation to a large extent. While this i-com Special Issue on “Human-Machine Interaction and Cooperation in Safety-Critical Systems” presents recent research results from specific application domains like aviation, automotive, crisis management and healthcare, this introductory paper outlines the diversity of users, technologies and interaction or cooperation models involved.
- TextdokumentA mapping approach for confguration management tools to close the gap between two worlds and to regain trust(INFORMATIK 2017, 2017) Meissner, Roy; Kastne, MarcusIn this paper we present the tool “DockerConverter”, an approach and a software to map a Docker configuration to various matured systems and also to reverse engineer any available Docker image in order to increase the confidence (or trust) into it. We show why a mapping approach is more promising than constructing a Domain Specific Language and why we chose a Docker image instead of the Dockerfile as the source model. Our overall goal is to enable Semantic Web research projects and especially Linked Data enterprise services to be better integrated into enterprise applications and companies.
- «
- 1 (current)
- 2
- 3
- »