An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems

2014 ◽  
Vol 8 (4) ◽  
pp. 44-61 ◽  
Author(s):  
Amr Ali-Eldin ◽  
Jan Van Den Berg ◽  
Semir Daskapan

With the growing interest in ubiquitous applications, attention should be given to privacy and trust issues. Since these environments are quite dynamic, and interactive where devices possess low computing resources, new trust models are required that suit this environment and help overcome its limitations. In this paper, the authors explore the possibility to settle trust in an adaptive way prior to any information disclosure to enable adaptive privacy and security. The proposed model is simulated in a commercial cluster scenario where users can clear all their payments with their short-range ubiquitous devices. In this domain, the authors assume that the user has to rely on what they call payment disclosure service (PDS) to control his or her disclosure decisions. The proposed model respects the limitations of wireless devices such as limited connectivity and processing resources, while enabling autonomous and secure operations.

2017 ◽  
Vol 1 (1) ◽  
pp. 61-73 ◽  
Author(s):  
Yongqiang Sun ◽  
Dina Liu ◽  
Nan Wang

Abstract Although user information disclosure behavior in the context of social network service(SNS) has been well studied in previous literature, there is a lack of understanding about user information withholding behavior. To fill this research gap, the present study assumes that there might be a three-way interaction among information sensitivity, prevention focus, and interdependent self-construal regarding information withholding. The proposed model is empirically tested through an online survey of 479 users in the context of WeChat, one of the most popular SNSs in China. The results of hierarchical regression analysis verify the three-way interaction that prevention focus positively moderates the relationship between information sensitivity and information withholding, and interdependent self-construal strengthens the moderating effect of prevention focus. Findings in light of theoretical and practical implications as well as limitations of the study are discussed.


2012 ◽  
Vol 4 (1) ◽  
pp. 33-36 ◽  
Author(s):  
Valerie R. Watzlaf ◽  
Briana Ondich

Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant;  most did not.  While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes.  Recommendations are provided for VoIP companies, providers, and users. 


Author(s):  
Jongheon Kim ◽  
David Ang* ◽  
Gang-hoon Kim

With technology advanced and the flourishing of wired or wireless networks in our daily life, privacy and trustability of transaction media have become highly cherished value. Individuals often make choices in which they surrender a certain degree of privacy in exchange for outcomes or convenience that are perceived to be worthy of the risk of information disclosure. This research attempts to facilitate understandings of the utility of the Technology Acceptance Model (TAM) which is a strongly supported and well-established vehicle in information research and incorporates privacy, risk, and trust factor that are previously regarded as separate research areas from TAM. In addition, it also suggests individual dispositions as precursory factors and examines how they affect users’ risk and trust perception in using transactional e-government services. The proposed model was tested using data gathered from 309 respondents from an internet survey. Structural equation modeling (SEM) using Mplus was employed to validate measurement and structural model. Based on this outcome, the measurements were redefined as composite scores, and subsequent path analysis was conducted to test the proposed hypotheses. The findings provide the structural or causal model of the proposed model attainable, but it requires the development of reliable and valid measurement scales.


Author(s):  
Clare Doherty ◽  
Michael Lang ◽  
James Deane ◽  
Regina Connor

This chapter explores how six constructs—control, trust, perceived risk, risk propensity, perceived legal protection, and privacy disposition—affect information disclosure on the Social Networking Site (SNS) Facebook. Building upon previous related work, an extended causal model of disclosure behaviour is proposed. The hypothesised relationships in this model were tested using survey data collected from 278 social networking site users in Ireland. The results of the analysis provide strong support for the proposed model.


2012 ◽  
Vol 4 (1) ◽  
pp. 3-6
Author(s):  
Ellen R. Cohn ◽  
Jana Cason

The current issue of the International Journal of Telerehabilitation (IJT) contains original research evaluating the efficacy of telerehabilitation; an evaluation of a telerehabilitation system for community based research; and work that examines users’ perceptions of the privacy and security of the three top used consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems (e.g., Skype  and others) used by health care providers to deliver therapeutic services via telerehabilitation. Two Brief Communications authored by speech-language pathologists present the possibilities for significant telehealth related cost-savings when telepractice is implemented in clinical practice.  Finally, this issue presents a report generated by a working group within the American Telemedicine Association’s Telerehabilitation Special Interest Group, and announcements from the American Telemedicine Association and the International Society for Augmentative and Alternative Communication (ISAAC).


2009 ◽  
pp. 3215-3241 ◽  
Author(s):  
João Pedro Sousa ◽  
Bradley Schmerl ◽  
Peter Steenkiste ◽  
David Garlan

This chapter introduces a new way of thinking about software systems for supporting the activities of end-users. In this approach, models of user activities are promoted to first class entities, and software systems are assembled and configured dynamically based on activity models. This constitutes a fundamental change of perspective over traditional applications; activities take the main stage and may be long-lived, whereas the agents that carry them out are plentiful and interchangeable. The core of the chapter describes a closed-loop control design that enables activity-oriented systems to become self-aware and self-configurable, and to adapt to dynamic changes both in the requirements of user activities and in the environment resources. The chapter discusses how that design addresses challenges such as user mobility, resolving conflicts in accessing scarce resources, and robustness in the broad sense of responding adequately to user expectations, even in unpredictable situations, such as random failures, erroneous user input, and continuously changing resources. The chapter further summarizes challenges and ongoing work related to managing activities where humans and automated agents collaborate, human-computer interactions for managing activities, and privacy and security aspects.


e-Polymers ◽  
2004 ◽  
Vol 4 (1) ◽  
Author(s):  
José R. S. André ◽  
José J. C. Cruz Pinto

Abstract Non-linear creep is described by a non-simulative, analytical, dynamic molecular modelling approach. Elementary, molecular-scale, process-relevant frequencies are derived by adequate kinetic formulation. They follow almost exactly an Arrhenius-like behaviour with a range of activation enthalpies. Their relative contribution to the overall macroscopic behaviour of the materials is quantified to account for the materials’ retardation time spectra and final non-Arrhenius behaviour. A new creep compliance equation is derived, yielding a fully coupled timetemperature- stress formulation, with long-term predictive capability. Experimental data for poly(methyl methacrylate) are analysed to identify the extent to which timetemperature and time-stress correspondence relationships may be valid, and it is shown that they are approximations (especially the latter), limited to narrow ranges of experimental variables, in contrast to the proposed model, which more reasonably fits the experimental behaviour.


2017 ◽  
Vol 32 (S1) ◽  
pp. S27-S34 ◽  
Author(s):  
D. Ectors ◽  
F. Goetz-Neunhoeffer ◽  
J. Neubauer

In this study, the application of (an)isotropic size determination using a recently proposed model for the double-Voigt approach is demonstrated and validated against line profile simulations using the Whole Powder Pattern Modelling approach. The fitting of simulated line profiles demonstrates that the attained crystallite sizes and morphologies are in very reasonable agreement with the simulated values and thus demonstrate that even in routine application scenarios credible size and morphology information can be obtained using the double-Voigt approximation. The aim of this contribution is to provide a comprehensive introduction to the problem, address the practical application of the developed model, and discuss the accuracy of the double-Voigt approach and derived size parameters. Mathematical formulations for the visualization of modeled morphologies, supporting the application of the recently developed macros, are additionally provided.


Author(s):  
MUKESH KUMAR MEHLAWAT

In this paper, we propose a multi-choice goal programming (MCGP) model of the multi-objective commercial-off-the-shelf (COTS) products selection problem. The proposed model simultaneously minimize the total cost, size, execution time and delivery time and maximize the system reliability of a modular software system subject to many realistic constraints including incompatibility among COTS products. We assume that the decision maker provides multiple aspiration levels regarding cost, size, execution time, delivery time and reliability objectives using discrete choices. To obtain efficient COTS selection plans, we use MCGP methodology to solve the COTS products selection problem. A real-world case study is discussed to demonstrate the effectiveness of the proposed model and methodology.


2019 ◽  
Vol 4 (3) ◽  
pp. 121-124
Author(s):  
ABDULLAH Musa Cledumas ◽  
YUSRI BIN KAMIN ◽  
RABIU HARUNA ◽  
SHUAIBU HALIRU

Abstract This paper proposes an improved modelling approach for tessellating regular polygons in such a way that it is environmentally sustainable. In this paper, tessellation of polygons that have been innovated through the formed motifs, is an innovation from the traditional tessellations of objects and animals. The main contribution of this work is the simplification and innovating new patterns from the existing regular polygons, in which only three polygons (triangle, square and hexagon) that can free be tessellated are used, compared to using irregular polygons or other objects.  This is achieved by reducing the size of each polygon to smallest value and tessellating each of the reduced figure to the right or to left to obtain a two different designs of one unit called motif. These motifs are then combined together to form a pattern. In this innovation it is found that the proposed model is superior than tessellating ordinary regular polygon, because more designs are obtained, more colours may be obtained or introduced to give meaningful tiles or patterns. In particular Tessellations can be found in many areas of life. Art, architecture, hobbies, clothing design, including traditional wears and many other areas hold examples of tessellations found in our everyday surroundings.


Sign in / Sign up

Export Citation Format

Share Document