Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION - Bridge of Knowledge

Search

Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION

Filters

total: 234
filtered: 169

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Full text available to download

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

  • Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - TELEMATICS AND INFORMATICS - Year 2024

    The academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...

    Full text to download in external service

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Full text to download in external service

  • Instytucje demokracji bezpośredniej, partycypacyjnej i deliberacyjnej w Gdańsku od 2010 roku

    Publication

    - Year 2023

    Tematem tej pracy doktorskiej jest studium przypadku stanu demokracji w Gdańsku. Miasto Gdańsk jest uważane jako jedno z najbardziej demokratycznych miast w Polsce, jednak czy to założenie pokrywa się z faktami? Analiza Autora rozprawy doktorskiej jest skupiona na instytucjach demokratycznych na poziomie lokalnym, ze szczególnym uwzględnieniem obywatelskiej inicjatywy uchwałodawczej jako instrumentu...

  • The comparison of Internet Mortgage Market in Selected EU Countries

    Publication

    The paper presents the description of Internet mortgage market in selected European Union countries. It starts with brief introduction to the concept of creating a fuzzy model representing Polish Internet Mortgage Market. Then, for better understanding of the complexities of this kind of market functioning the comparison is made between mortgage markets in Poland, Estonia, Germany and The United Kingdom (UK): The UK as the European...

  • Digital Public Service Innovation: Framework Proposal

    Publication

    - Year 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Full text to download in external service

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publication

    - Year 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Full text to download in external service

  • Political Parties in the Digital World

    Publication

    - Year 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • Is Digitalization Improving Governance Quality? Correlating Analog and Digital Benchmarks

    Publication

    The digitalization of public governance and the resulting concept of electronic governance is a characteristic feature of contemporary information society. Both can be defined as the process and outcome of digital transformation: transformation of the “analog” version of governance into “digital” governance. Measuring both versions of governance against typical performance measures of efficiency, effectiveness, equity, openness...

    Full text available to download

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • The Innovative Faculty for Innovative Technologies

    A leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...

    Full text to download in external service

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Publication

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Full text available to download

  • Proces rozwoju dokumentu petycji elektronicznej wykorzystujący algorytm genetyczny

    Publication
    • A. Ryszewski

    - Year 2009

    W oparciu o opracowaną przez siebie wcześniej koncepcję hybrydowej architektury systemu petycji elektronicznej, autor zaproponował wykorzystanie algorytmu genetycznego do sterowania procesu edycji dokumentu przez wielkie grupy obywateli (100 tysięcy i więcej). Z przeprowadzonych badań symulacyjnych wynika, że możliwe jest osiągnięcie wersji dokumentu spełniającego kryterium liczby zwolenników (podpisów obywateli) w niewielkiej...

  • Pursuing Analytically the Influence of Hearing Aid Use on Auditory Perception in Various Acoustic Situations

    Publication

    - Vibrations in Physical Systems - Year 2022

    The paper presents the development of a method for assessing auditory perception and the effectiveness of applying hearing aids for hard-of-hearing people during short-term (up to 7 days) and longer-term (up to 3 months) use. The method consists of a survey based on the APHAB questionnaire. Additional criteria such as the degree of hearing loss, technological level of hearing aids used, as well as the user experience are taken...

    Full text available to download

  • E-LEARNING NA POLITECHNICE GDAŃSKIEJ - HISTORIA ROZWOJU W LATACH 1995-2020

    Publication

    Internet oraz kształcenie oparte na wykorzystaniu e-technologii stały się nieodłącznym elementem edukacji. Artykuł przedstawia zarys historii rozwoju e-learningu na Politechnice Gdańskiej, przykładowe rozwiązania technologiczne, elementy tworzenia struktur organizacyjnych oraz związanych z legislacją, a także wybrane projekty wykorzystujące szeroko pojęte e-technologie w edukacji akademickiej realizowanej na Uczelni

    Full text available to download

  • The effects of perceived risk, brand value, and brand trust on eWOM

    Publication

    Unrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...

    Full text available to download

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty

    This paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...

    Full text to download in external service

  • Validating the Rules of Government Automation

    Publication

    - Year 2022

    There is growing evidence on the benefits and risks of government automation, and how should government organizations proceed with automation when the benefits outweigh the risks. This evidence was recently consolidated into the "rules of government automation", part of the project funded by the Inter-American Development Bank. The project uncovered that the combined nature of government work and its transformation into digital...

    Full text to download in external service

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Semantic Integration of Heterogeneous Recognition Systems

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2011

    Computer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...

  • Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC

    Publication

    Opisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...

    Full text to download in external service

  • How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - Year 2023

    Open Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...

    Full text available to download

  • Zaufanie do marek jako mediator pomiędzy postrzeganym ryzykiem i skłonnością do elektronicznego word-of-mouth

    Publication

    - Handel Wewnętrzny - Year 2017

    Rozwój Internetu oraz dostęp konsumentów do mediów społecznościowych wpływają na ich zaangażowanie on-line. Odzwierciedla to również sposób, w jaki konsumenci wyrażają opinie o markach i produktach w Sieci. Celem ankiety było zbadanie wpływu postrzeganego ryzyka i zaufania do marki na skłonność konsumentów do electronic word-of-mouth (eWOM). Ponadto, autorzy zbadali rolę zaufania do marki jako mediatora w relacji między postrzeganym...

    Full text available to download

  • Researching Digital Society: Using Data-Mining to Identify Relevant Themes from an Open Access Journal

    Publication

    - Year 2021

    Open Access scholarly literature is scientific output free from economic barriers and copyright restrictions. Using a case study approach, data mining methods and qualitative analysis, the scholarly output and the meta-data of the Open Access eJournal of e-Democracy and Open Government during the time interval 2009–2020 was analysed. Our study was able to identify the most prominent research topics (defined as thematic clusters)...

    Full text to download in external service

  • Researching Digital Society: Using Data-Mining to Identify Relevant Themes from an Open Access Journal

    Publication

    - Year 2021

    Open Access scholarly literature is scientific output free from economic barriers and copyright restrictions. Using a case study approach, data mining methods and qualitative analysis, the scholarly output and the meta-data of the Open Access eJournal of e-Democracy and Open Government during the time interval 2009–2020 was analysed. Our study was able to identify the most prominent research topics (defined as thematic clusters)...

    Full text available to download

  • CoRBAC – kontekstowo zorientowany model bezpieczeństwa

    Zaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.

    Full text to download in external service

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.

    Publication

    - Year 2022

    ML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...

    Full text available to download

  • Architecture and Basic Assumptions of RSMAD

    The study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku

    W artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Perspektywy wykorzystania technologii internetowych typu E-learning w dydaktyce szkół wyższych.

    Publication

    Artykuł dotyczy nauczania przez Internet na poziomie uniwersyteckim. Zaprezentowany został model wirtualnego uniwersytetu, który obejmuje materiały dydaktyczne, komunikację, egzaminy i organizację. Artykuł koncentruje się na technicznych zagadnieniach. Przeanalizowano także wpływ wykorzystania technologii E-learning na różne aspekty życia wyższej uczelni.

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Full text to download in external service

  • The use and development of e-learning systems in educational projects

    Publication

    - Year 2014

    The article introduces the problem of usage and development of e-learning systems among Polish universities. Easily accessible internet and IT development led to changes in education. Through the use of IT tools, e-learning has become an increasingly popular form of education. Presently, majority of Polish universities use an e-learning system of their own choosing designed to support the didactic processes. The goal of the article...

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publication

    - Year 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • Side Effects of National Immunization Program: E-Governance Support Toward Elders' Digital Inclusion

    Publication

    In response to the coronavirus pandemic, the European Union (EU) governments develop policies to regulate exclusive health protection actions that consider societal needs with the emphasis on elders. Given that the EU vaccination strategy uses a centralized ICT-based approach, there is little guidance on how seniors are included in national immunization programs (NIP). In this paper, we addressed a knowledge gap of the side effects...

    Full text available to download

  • Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system

    The study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...

  • Analysis of human behavioral patterns

    Publication

    - Year 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Full text to download in external service

  • Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case

    Publication

    - Year 2021

    Internet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...

    Full text available to download

  • Wybrane aspekty zachowań internautów a skuteczny proces komunikacji marketingowej

    Publication

    Celem artykułu jest przedstawienie sposobów pozyskiwania internetowych treści związanych z organizacjami lub produktami oraz dzielenia się nimi z innymi. W publikacji zwrócono uwagę na potrzebę zmiany postrzegania roli internautów w procesie komunikacji marketingowej. Ponadto, artykuł nawiązuje do koncepcji inbound marketing. Koncepcja ta dotyczy nie tylko przyciągania klientów do firmy i jej produktów. Chodzi w niej o by poprzez...

  • Edge-Computing based Secure E-learning Platforms

    Publication

    - Year 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Full text available to download

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publication

    - CMC-Computers Materials & Continua - Year 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Full text available to download

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...

    Full text available to download

  • Internet w procesie kształcenia studentów

    Publication

    Wirtualna rzeczywistość sieci komputerowych staje się coraz bardziej obecna w naszym życiu. Internet odgrywa rosnącą rolę w edukacji, rekrutacji, handlu, sprawowaniu władzy oraz rozrywce. Dlatego też zastanowić się trzeba, na jakie problemy napotykają wykładowcy przy tworzeniu materiałów dostępnych przez Internet oraz studenci w związku z wykorzystaniem nowoczesnych technologii do pozyskiwania informacji i wiedzy....

    Full text to download in external service

  • Techniczne aspekty implementacji nowoczesnej platformy e-learningowej

    Zaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.

    Full text available to download