Search results for: trust, distrust, e-democracy, internet voting, privacy, security, perception
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
A theoretical framework for understanding trust and distrust in internet voting
PublicationEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
David Duenas Cid dr hab.
PeopleHe is an Associate Professor at Kozminski University and the director of the Pub-Tech (Public Sector Data-Driven Technologies) Research Center. Previously, he served as an H2020 Marie Skłodowska-Curie Widening Fellow at Gdansk University of Technology, as a Researcher at the Johan Skytte Institute of Political Studies of the University of Tartu, as a Postdoctoral Researcher at the Ragnar Nurkse Department of Innovation and Governance...
-
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublicationThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Safeguarding democracy during pandemics. Social distancing, postal, or internet voting—the good, the bad, or the ugly?
PublicationDuring a pandemic, many countries and organizations must decide whether to postpone upcoming elections or to hold them (Krimmer et al., 2020a). If the decision is made to hold the election, three main scenarios come to mind: continue using the existing system but include measures to ensure the health of participants; or look for alternatives among remote voting channels which could ensure social distancing is guaranteed either...
-
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublicationW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublicationThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Bidirectional voting and continous voting concepts as possible use of Internet in democratic voting process
PublicationDemocracies need elections for choosing their authorities and governments.This process has many factors that shape today's procedures. However, the Internet is a medium that may change possibilities and elections. The main issue is concern on how changes may influence the whole democratic process. this paper shows two possible ideas - that of bidirectional voting and continous voting., and considers possible reasons for introducing...
-
Analyzing Preconditions to Introduce Internet Voting in Portugal: Insights from the Estonian Model
PublicationInternet voting has been trialed or introduced for several countries, including Norway, Portugal, United States, United Kingdom and Switzerland as an additional voting channel to increase voter turnout and, also to modernize the electoral process. However, only Estonia has successful introduced internet voting, deploying e-enabled elections in general governmental levels. This paper aims to provide an exploratory study on the Estonian...
-
Tripped at the Finishing Line: The Åland Islands Internet Voting Project
PublicationThe Åland Islands spent years preparing an internet voting system, to be implemented for the first time in October 2019 for Parliamentary Elections. Despite this, the project was canceled the evening before the expected release date. In this paper, we explore the causes of this failure using a two-pronged approach including Information System failure perspectives and the approach to e-voting Mirabilis, focusing on organizational...
-
New methodology for calculating cost-efficiency of different ways of voting: is internet voting cheaper?
PublicationNew ways of voting in elections are being sought by electoral administrations worldwide who want to reverse declining voter turnouts without increasing electoral budgets. This paper presents a novel approach to cost accounting for multi-channel elections based on local elections in Estonia. By doing so, it addresses an important gap in the academic literature in this field. The authors confirm that internet voting was most cost-efficient...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublicationE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Democracy & Security
Journals -
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Security and Privacy
Journals -
Determinants of Internet use regarding shopping preferences, COVID-19 pandemic occurrence, perception of security and Internet marketing – a case study of Poland
Publication -
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublicationAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
Internet photogrammetry as a tool for e-learning
PublicationAlong with Internet development, there were interactive applications which allow for remote sensing and photogrammetric analysis. An example of an application that can provide Earth images and make it possible to measure distances in these images is Google Earth. The authors, who have experience from 2001-2015 argue that it is possible and it is important to create more advanced photogrammetric network applications. In this there...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
ACM Transactions on Privacy and Security
Journals -
Consumer Trust in Online Advertising - How Negative Perception Impacts its Effectiveness
Publication -
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublicationUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Trust in the source of received information as a factor related to public perception of shale gas drilling
Publication -
Krzysztof Gierłowski dr inż.
PeopleKrzysztof Gierłowski received his Ph.D. degree in telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 2018. He is author or co-author of more than 80 scientific papers and reviewer for a number of conferences and journals. Krzysztof Gierłowski took part in major IT-oriented projects, including: EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 Infrastructural...
-
International Journal of Information Security and Privacy
Journals -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Mesh-based internet on the Baltic sea for improving e-navigation services. A case study
Publication -
Józef Woźniak prof. dr hab. inż.
PeopleProfessor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...
-
Journal of Internet Services and Information Security
Journals -
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
International Journal of Security, Privacy an d Trust Management
Journals -
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publication -
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publication -
Technology and democracy: the who and how in decision-making. The cases of Estonia and Catalonia
PublicationThis paper focuses on the use of technology to improve democracy, comparing the cases of Estonia and Catalonia. Both examples are closely related in their use of technology to further democratize the decision-making processes but have opposite starting points. Estonia’s internet voting system is an offshoot of the comprehensive e-governance system developed by the Estonian government. It is meant to make it more convenient for...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
IEEE SECURITY & PRIVACY
Journals -
Annual Conference on Privacy, Security and Trust
Conferences -
E-learning przez Internet w szkolnictwie wyższym. Doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej.
PublicationOpisano cztery podstawowe rodzaje e-learningu, przedstawiono strukturę funkcjonalną systemów zarządzania nauczaniem na odległość i zarządzania treścią nauczania (ang. LMS, LCMS) oraz zaprezentowano doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej w nauczaniu na odległość.
-
Workshop on Security and Privacy in e-Commerce
Conferences -
Piotr Szczuko dr hab. inż.
PeoplePiotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...
-
Dis/Trust and data-driven technologies
PublicationThis concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...
-
Paweł Lubomski dr inż.
PeoplePaweł Lubomski is the director of the IT Services Centre at the Gdańsk University of Technology. He is responsible for developing and maintaining the central information systems of the university. He is also in charge of the R&D team and works on new approaches to IT systems’ protection. He also acts as the project manager of two big innovative IT projects co-financed by the European Funds. He received a PhD degree in computer...
-
International Conference on Trust, Privacy and Security in Digital Business
Conferences -
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Karol Zdzisław Zalewski mgr inż.
People