Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION - Bridge of Knowledge

Search

Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION

Search results for: TRUST, DISTRUST, E-DEMOCRACY, INTERNET VOTING, PRIVACY, SECURITY, PERCEPTION

  • Digital Public Service Innovation: Framework Proposal

    Publication

    - Year 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Full text to download in external service

  • International Conference on Internet of Things, Big Data and Security

    Conferences

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publication

    - Year 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Full text to download in external service

  • Political Parties in the Digital World

    Publication

    - Year 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • Kacper Wereszko mgr inż.

    People

    Kacper Wereszko received the M.Sc. in 2016 (field of study: computer science, specialization: Internet technologies and algorithms). Since 2017 he is a Ph.D. student in the field of computer science. He works as assistant in Department of Algorithms and System Modelling. His research interests focus on security properties of graphs, domination problems in graphs and their practical applications.

  • Is Digitalization Improving Governance Quality? Correlating Analog and Digital Benchmarks

    Publication

    The digitalization of public governance and the resulting concept of electronic governance is a characteristic feature of contemporary information society. Both can be defined as the process and outcome of digital transformation: transformation of the “analog” version of governance into “digital” governance. Measuring both versions of governance against typical performance measures of efficiency, effectiveness, equity, openness...

    Full text available to download

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • The Innovative Faculty for Innovative Technologies

    A leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...

    Full text to download in external service

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Publication

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Full text available to download

  • Proces rozwoju dokumentu petycji elektronicznej wykorzystujący algorytm genetyczny

    Publication
    • A. Ryszewski

    - Year 2009

    W oparciu o opracowaną przez siebie wcześniej koncepcję hybrydowej architektury systemu petycji elektronicznej, autor zaproponował wykorzystanie algorytmu genetycznego do sterowania procesu edycji dokumentu przez wielkie grupy obywateli (100 tysięcy i więcej). Z przeprowadzonych badań symulacyjnych wynika, że możliwe jest osiągnięcie wersji dokumentu spełniającego kryterium liczby zwolenników (podpisów obywateli) w niewielkiej...

  • Pursuing Analytically the Influence of Hearing Aid Use on Auditory Perception in Various Acoustic Situations

    Publication

    - Vibrations in Physical Systems - Year 2022

    The paper presents the development of a method for assessing auditory perception and the effectiveness of applying hearing aids for hard-of-hearing people during short-term (up to 7 days) and longer-term (up to 3 months) use. The method consists of a survey based on the APHAB questionnaire. Additional criteria such as the degree of hearing loss, technological level of hearing aids used, as well as the user experience are taken...

    Full text available to download

  • Information Systems Security 2023

    e-Learning Courses
    • B. Czaplewski
    • M. Dzwonkowski
    • J. A. Litka

    The e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).

  • Information Systems Security 2023/2024

    e-Learning Courses
    • B. Czaplewski

    The e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).

  • E-LEARNING NA POLITECHNICE GDAŃSKIEJ - HISTORIA ROZWOJU W LATACH 1995-2020

    Publication

    Internet oraz kształcenie oparte na wykorzystaniu e-technologii stały się nieodłącznym elementem edukacji. Artykuł przedstawia zarys historii rozwoju e-learningu na Politechnice Gdańskiej, przykładowe rozwiązania technologiczne, elementy tworzenia struktur organizacyjnych oraz związanych z legislacją, a także wybrane projekty wykorzystujące szeroko pojęte e-technologie w edukacji akademickiej realizowanej na Uczelni

    Full text available to download

  • The effects of perceived risk, brand value, and brand trust on eWOM

    Publication

    Unrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...

    Full text available to download

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Australasian Information Security Workshop 2007 (Privacy Enhancing Technologies)

    Conferences

  • European Workshop on Security and Privacy in Ad -Hoc and Sensor Networks

    Conferences

  • Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty

    This paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...

    Full text to download in external service

  • Validating the Rules of Government Automation

    Publication

    - Year 2022

    There is growing evidence on the benefits and risks of government automation, and how should government organizations proceed with automation when the benefits outweigh the risks. This evidence was recently consolidated into the "rules of government automation", part of the project funded by the Inter-American Development Bank. The project uncovered that the combined nature of government work and its transformation into digital...

    Full text to download in external service

  • Michał Hoeft dr inż.

    Michał Hoeft graduated with distinction form Gdansk University of Technology (GUT), Gdansk, Poland in 2011. His main areas of research interest contain: effective mobility management and handover optimisation in 802.11 networks. Michał Hoeft has been involved in major communication-oriented projects including the EU-funded Polish Future Internet Engineering initiative, PL-LAB2020 and netBaltic projects. He has served as a reviewer...

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Marek Czachor prof. dr hab.

  • Semantic Integration of Heterogeneous Recognition Systems

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2011

    Computer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...

  • Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC

    Publication

    Opisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...

    Full text to download in external service

  • How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - Year 2023

    Open Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...

    Full text available to download

  • Magdalena Szuflita-Żurawska

    Head of the Scientific and Technical Information Services at the Gdansk University of Technology Library and the Leader of the Open Science Competence Center. She is also a Plenipotentiary of the Rector of the Gdańsk University of Technology for open science.  She is a PhD Candidate. Her main areas of research and interests include research productivity, motivation, management of HEs, Open Access, Open Research Data, information...

  • Zaufanie do marek jako mediator pomiędzy postrzeganym ryzykiem i skłonnością do elektronicznego word-of-mouth

    Publication

    - Handel Wewnętrzny - Year 2017

    Rozwój Internetu oraz dostęp konsumentów do mediów społecznościowych wpływają na ich zaangażowanie on-line. Odzwierciedla to również sposób, w jaki konsumenci wyrażają opinie o markach i produktach w Sieci. Celem ankiety było zbadanie wpływu postrzeganego ryzyka i zaufania do marki na skłonność konsumentów do electronic word-of-mouth (eWOM). Ponadto, autorzy zbadali rolę zaufania do marki jako mediatora w relacji między postrzeganym...

    Full text available to download

  • Researching Digital Society: Using Data-Mining to Identify Relevant Themes from an Open Access Journal

    Publication

    - Year 2021

    Open Access scholarly literature is scientific output free from economic barriers and copyright restrictions. Using a case study approach, data mining methods and qualitative analysis, the scholarly output and the meta-data of the Open Access eJournal of e-Democracy and Open Government during the time interval 2009–2020 was analysed. Our study was able to identify the most prominent research topics (defined as thematic clusters)...

    Full text to download in external service

  • Researching Digital Society: Using Data-Mining to Identify Relevant Themes from an Open Access Journal

    Publication

    - Year 2021

    Open Access scholarly literature is scientific output free from economic barriers and copyright restrictions. Using a case study approach, data mining methods and qualitative analysis, the scholarly output and the meta-data of the Open Access eJournal of e-Democracy and Open Government during the time interval 2009–2020 was analysed. Our study was able to identify the most prominent research topics (defined as thematic clusters)...

    Full text available to download

  • CoRBAC – kontekstowo zorientowany model bezpieczeństwa

    Zaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.

    Full text to download in external service

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.

    Publication

    - Year 2022

    ML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...

    Full text available to download

  • Architecture and Basic Assumptions of RSMAD

    The study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • ADMEDVOICE Adaptive intelligent speech processing system of medical personnel with the structuring of test results and support of therapeutic process

    Projects

    Project manager: prof. dr hab. inż. Andrzej Czyżewski   Financial Program Name: INFOSTRATEG

    Project realized in Department of Multimedia Systems according to INFOSTRATEG4/0003/2022 agreement from 2023-05-04

  • Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku

    W artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Perspektywy wykorzystania technologii internetowych typu E-learning w dydaktyce szkół wyższych.

    Publication

    Artykuł dotyczy nauczania przez Internet na poziomie uniwersyteckim. Zaprezentowany został model wirtualnego uniwersytetu, który obejmuje materiały dydaktyczne, komunikację, egzaminy i organizację. Artykuł koncentruje się na technicznych zagadnieniach. Przeanalizowano także wpływ wykorzystania technologii E-learning na różne aspekty życia wyższej uczelni.

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Full text to download in external service

  • The use and development of e-learning systems in educational projects

    Publication

    - Year 2014

    The article introduces the problem of usage and development of e-learning systems among Polish universities. Easily accessible internet and IT development led to changes in education. Through the use of IT tools, e-learning has become an increasingly popular form of education. Presently, majority of Polish universities use an e-learning system of their own choosing designed to support the didactic processes. The goal of the article...

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publication

    - Year 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • Side Effects of National Immunization Program: E-Governance Support Toward Elders' Digital Inclusion

    Publication

    In response to the coronavirus pandemic, the European Union (EU) governments develop policies to regulate exclusive health protection actions that consider societal needs with the emphasis on elders. Given that the EU vaccination strategy uses a centralized ICT-based approach, there is little guidance on how seniors are included in national immunization programs (NIP). In this paper, we addressed a knowledge gap of the side effects...

    Full text available to download

  • Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system

    The study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...

  • Analysis of human behavioral patterns

    Publication

    - Year 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Full text to download in external service

  • Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case

    Publication

    - Year 2021

    Internet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...

    Full text available to download

  • Wybrane aspekty zachowań internautów a skuteczny proces komunikacji marketingowej

    Publication

    Celem artykułu jest przedstawienie sposobów pozyskiwania internetowych treści związanych z organizacjami lub produktami oraz dzielenia się nimi z innymi. W publikacji zwrócono uwagę na potrzebę zmiany postrzegania roli internautów w procesie komunikacji marketingowej. Ponadto, artykuł nawiązuje do koncepcji inbound marketing. Koncepcja ta dotyczy nie tylko przyciągania klientów do firmy i jej produktów. Chodzi w niej o by poprzez...

  • Edge-Computing based Secure E-learning Platforms

    Publication

    - Year 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Full text available to download

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publication

    - CMC-Computers Materials & Continua - Year 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Full text available to download

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...

    Full text available to download