Filters
total: 240
filtered: 174
Search results for: trust, distrust, e-democracy, internet voting, privacy, security, perception
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
A theoretical framework for understanding trust and distrust in internet voting
PublicationEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublicationThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Safeguarding democracy during pandemics. Social distancing, postal, or internet voting—the good, the bad, or the ugly?
PublicationDuring a pandemic, many countries and organizations must decide whether to postpone upcoming elections or to hold them (Krimmer et al., 2020a). If the decision is made to hold the election, three main scenarios come to mind: continue using the existing system but include measures to ensure the health of participants; or look for alternatives among remote voting channels which could ensure social distancing is guaranteed either...
-
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublicationW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublicationThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Bidirectional voting and continous voting concepts as possible use of Internet in democratic voting process
PublicationDemocracies need elections for choosing their authorities and governments.This process has many factors that shape today's procedures. However, the Internet is a medium that may change possibilities and elections. The main issue is concern on how changes may influence the whole democratic process. this paper shows two possible ideas - that of bidirectional voting and continous voting., and considers possible reasons for introducing...
-
Analyzing Preconditions to Introduce Internet Voting in Portugal: Insights from the Estonian Model
PublicationInternet voting has been trialed or introduced for several countries, including Norway, Portugal, United States, United Kingdom and Switzerland as an additional voting channel to increase voter turnout and, also to modernize the electoral process. However, only Estonia has successful introduced internet voting, deploying e-enabled elections in general governmental levels. This paper aims to provide an exploratory study on the Estonian...
-
Tripped at the Finishing Line: The Åland Islands Internet Voting Project
PublicationThe Åland Islands spent years preparing an internet voting system, to be implemented for the first time in October 2019 for Parliamentary Elections. Despite this, the project was canceled the evening before the expected release date. In this paper, we explore the causes of this failure using a two-pronged approach including Information System failure perspectives and the approach to e-voting Mirabilis, focusing on organizational...
-
New methodology for calculating cost-efficiency of different ways of voting: is internet voting cheaper?
PublicationNew ways of voting in elections are being sought by electoral administrations worldwide who want to reverse declining voter turnouts without increasing electoral budgets. This paper presents a novel approach to cost accounting for multi-channel elections based on local elections in Estonia. By doing so, it addresses an important gap in the academic literature in this field. The authors confirm that internet voting was most cost-efficient...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublicationE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Determinants of Internet use regarding shopping preferences, COVID-19 pandemic occurrence, perception of security and Internet marketing – a case study of Poland
Publication -
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublicationAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
Internet photogrammetry as a tool for e-learning
PublicationAlong with Internet development, there were interactive applications which allow for remote sensing and photogrammetric analysis. An example of an application that can provide Earth images and make it possible to measure distances in these images is Google Earth. The authors, who have experience from 2001-2015 argue that it is possible and it is important to create more advanced photogrammetric network applications. In this there...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
Consumer Trust in Online Advertising - How Negative Perception Impacts its Effectiveness
Publication -
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublicationUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Trust in the source of received information as a factor related to public perception of shale gas drilling
Publication -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Mesh-based internet on the Baltic sea for improving e-navigation services. A case study
Publication -
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publication -
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publication -
Technology and democracy: the who and how in decision-making. The cases of Estonia and Catalonia
PublicationThis paper focuses on the use of technology to improve democracy, comparing the cases of Estonia and Catalonia. Both examples are closely related in their use of technology to further democratize the decision-making processes but have opposite starting points. Estonia’s internet voting system is an offshoot of the comprehensive e-governance system developed by the Estonian government. It is meant to make it more convenient for...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
E-learning przez Internet w szkolnictwie wyższym. Doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej.
PublicationOpisano cztery podstawowe rodzaje e-learningu, przedstawiono strukturę funkcjonalną systemów zarządzania nauczaniem na odległość i zarządzania treścią nauczania (ang. LMS, LCMS) oraz zaprezentowano doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej w nauczaniu na odległość.
-
Dis/Trust and data-driven technologies
PublicationThis concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Rozliczalność władzy politycznej jako element wzmocnienia demokracji i podwyższenia jej jakości: przykład Polski
PublicationCelem artykułu jest wskazanie odpowiednich,...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
How Much Does an e-Vote Cost? Cost Comparison per Vote in Multichannel Elections in Estonia
PublicationWe are presenting the results of the CoDE project in this paper, where we investigate the costs per vote of different voting channels in Estonian Local Elections (2017). The elections analyzed involve different processes for casting a vote: Early Voting at County Centers, Advance Voting at County Centers, Advance Voting at Ordinary Voting District Committees, Electronic Voting, Election Day Voting, and Home Voting. Our analysis...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublicationPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Can augmented democracy fulfil the ideal of deliberative democracy?
PublicationNew technologies can broaden the scope of human limits. We can fly to the moon thanks to rocket science, we can communicate with each other by mobile phones and WiFi and we can exceed human life with medical equipment like pacemakers. But there are aspects of our life that still are very distrustful of implementing new technology into functioning. An example of such a field of our everyday life is...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublicationEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War
PublicationIn this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...
-
Molecular dynamics and verisimilitude - to what extent can one trust a computational simulation?
PublicationFor the last several tens of years, computer simulations have become of undeniable importance. Molecular Dynamics (MD) simulation techniques are used to examine the phenomena which occur at the level that cannot be observed directly. Thus, they can be successfully exploited in many different scientific fields such as: materials science, applied mathematics and theoretical physics, biochemistry, biophysics or drug design. Despite...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublicationNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments
PublicationLack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...