Auflistung nach Schlagwort "transparency"
1 - 6 von 6
Treffer pro Seite
Sortieroptionen
- TextdokumentAnonymization Is Dead – Long Live Privacy(Open Identity Summit 2019, 2019) Zibuschka, Jan; Kurowski, Sebastian; Roßnagel, Heiko; Schunck, Christian H.; Zimmermann, ChristianPrivacy is a multi-faceted, interdisciplinary concept, with varying meaning to different people and disciplines. To most researchers, anonymity ist he “holy grail” of privacy research, as it suggests that it may be possible to avoid personal information altogether. However, time and time again, anonymization has been shown to be infeasible. Even de-facto anonymity is hardly achievable using state-of-the-art cryptographic anonymization techniques. Furthermore, as there are inherent tensions between the privacy protection goals of confidentiality, availability, integrity, transparency, intervenability and unlinkability, failed attempts to achieve full anonymization may make it impossible to provide data-subjects with transparency and intervenability. This is highly problematic as such mechanisms are required by regulation such as the General Data Protection Regulation (GDPR). Therefore, we argue for a paradigm shift away from anonymization towards transparency, accountability, and intervenability.
- KonferenzbeitragDesigning Software Transparency: A Multidisciplinary Endeavor(Softwaretechnik-Trends Band 40, Heft 1, 2020) Chazette, Larissa; Busch, Melanie; Schrapel, Maximilian; Korte, Kai; Schneider, KurtSoftware systems support end-users in making daily decisions, thanks to ubiquituous computing. As long as the system behaves in accordance to users’ expectations, the user continues to trust the system. In the case of unexpected software behavior, there is often a lack of transparency and comprehensibility, since the user cannot understand the reason for the resulting behavior. An extensive variety of requirements can be involved when we consider software transparency. These requirements are, most of the times, interrelated in a complex network, influencing each other. In this paper, we explore the opportunities of a multidisciplinary work and the possible challenges in achieving software transparency. We use a navigation scenario to explore the possibilities in terms of a system. The expected result of this joint dialogue is to identify challenges and constraints in the requirements operationalization, in the requirements process itself, and discuss adequate ways to overcome them.
- KonferenzbeitragExperiences from Building the Open Database Performance Ranking with benchANT(Softwaretechnik-Trends Band 43, Heft 1, 2023) Seybold, Daniel; Domaschka, JörgBenchmarking is an important method to advance database management systems (DBMS) from the industry and research perspective. Ensuring transparent and reproducible results is a key requirement to ensure the acceptance and credibility of benchmarking. To advance the research towards transparent and reproducible benchmark data, we report on building an open DBMS performance ranking with 130 benchmark configurations and ensuring comparability, transparency and reproducibility. We derive the required data on cloud, resource, DBMS and benchmark level to enable transparency and reproducibility and demonstrate the generation of such data sets with benchANT. Building upon such data, we outline future research directions for DBMS performance modelling, DBMS auto-tuning and decision support.
- KonferenzbeitragExtending the 0Auth2 Workflow to Audit Data Usage for Users and Service Providers In a Cooperative Scenario(10. DFN-Forum Kommunikationstechnologien, 2017) Politze, Marius; Decker, BerndThe increasing amount and heterogeneity of devices demands changes in IT infrastructure. Many web service architectures used to meet these demands use the OAuth2 workflow to secure their interfaces. These implementations usually tightly couple web services and an OAuth2 authorization service. The presented extension to the OAuth2 workflow is capable handling authorizations for multiple attached services and therefore combines existing services of a central IT service provider but also allows other services running in a cooperative model with only a single instance ofthe authorization server. Based on auditing parameters it is possible to present access per resource or per method giving service providers and application developers more insight in how their services are used and show users by whom their personal data is used.
- WorkshopbeitragRobo-Tooltips: Understandable Robots for Trustworthy Interactions(Mensch und Computer 2022 - Workshopband, 2022) Schött, Svenja Yvonne; Butz, AndreasTrust is a factor that can positively influence human-robot interactions. Transparent robot design and appropriately timed explanations have the potential to help users calibrate their trust in a robotic system. We introduce the idea of robo-tooltips, physical markers that signal to users that additional information about the robot is available, which they can access at their own discretion. We showcase the concept, which is similar to the tooltips used in desktop environments, by attaching QR codes to a robot. When the user interacts with the QR code, descriptions on the capabilities and behavior of the respective part of the robot are displayed. We present scenarios during which the user retrieves information using robo-tooltips. Further, we discuss some opportunities and challenges of offering optional explanations during human-robot interaction and outline directions for future work.
- WorkshopbeitragStructuring and Exploring User Behavioral Patterns in Social Media Traces(Mensch und Computer 2020 - Workshopband, 2020) Herder, Eelco; Roßner, Daniel; Atzenbeck, ClausUser behavior and the resulting behavioral data forms the basis of personalized feeds, recommendations and advertisements in social networks such as Facebook. These platforms are now required to provide users with their personal data. However, these dumps with chronological data in different files do not provide users insight in overarching themes and connections in their online behavior. In this paper, we discuss the development and preliminary evaluation of an exploratory interface for visual data exploration. First insights include that the less obvious, more associative and obscure connections are more interesting and relevant to the user than very close semantic or temporal connections.