Search results for: trust-it
-
Trustee : the journal for hospital governing boards
Journals -
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
TrustPublSM DETERMINING THE TRUSTWORTHINESS OF PUBLIC INFORMATION ON SOCIAL MEDIA USING LINGUISTIC-BASED TEXT ANALYTICS APPROACH
ProjectsProject realized in Department of Informatics in Management
-
IAVoSS Workshop On Trustworthy Elections
Conferences -
International Conference on Advanced and Trusted Computing (International Conference on Autonomic and Trusted Computing)
Conferences -
ACM Workshop on Scalable Trusted Computing
Conferences -
Helicobacter muridarum sp. nov., a Microaerophilic Helical Bacterium with a Novel Ultrastructure Isolated from the Intestinal Mucosa of Rodents
Publication -
Trustworthy Interfaces for Passwords and Personal Information workshop
Conferences -
Compliance with the restrictions during the COVID-19 pandemic in Poland and Sweden
Open Research DataOur study is aimed to check if the difference between Sweden and Poland in trust is related to negative affective reactions to authorities and law antipathy being manifestations of lack of trust and related to value-based legitimacy, behavioral legitimacy and prosocial justification of compliance with the restrictions put on citizens to limit the spread...
-
Supporting Assurance by Evidence-based Argument Services
PublicationStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Agata Ewa Chudzicka-Czupała
PeopleShe is a specialist in psychology (work and organizational psychology, health psychology). She works at the SWPS University, Department of Psychology, Poland. She conducts research in the field of health psychology, dealing with the psychological costs of volunteering, participation in traumatic events, determinants of mental health, and stress in difficult situations such as pandemics or war. In researching these phenomena,...
-
SCF - a Framework Supporting Achieving and Assessing Conformity with Standards
PublicationStandards Conformity Framework (SCF) presented in this paper encompasses methods and tools whichprovide support for application of standards and other normative documents. The approach taken focuses ondevelopment, assessment and maintenance of an electronic document which demonstrates conformity. Sucha document contains an argument structure developed in accordance with the Trust-IT methodology. Thepaper discusses details of the...
-
Zaufanie w zespole badawczym – studium przypadku (projekt CD NIWA realizowany na Politechnice Gdańskiej)
PublicationArtykuł dotyczy tematyki klimatu pracy zespołowej, ze szczególnym uwzględnieniem zaufania w zespole jako czynnika warunkującego zaangażowanie, efektywność i innowacyjność zespołu. Przeanalizowano znaczenie oraz wymiary zaufania w zespole badawczym na podstawie koncepcji International Team Trust Indicator, czyli dziesięciowymiarowego modelu zaufania. Celem artykułu jest analiza klimatu współpracy i poziomu zaufania w interdyscyplinarnym...
-
Paweł Lubomski dr inż.
PeoplePaweł Lubomski is the director of the IT Services Centre at the Gdańsk University of Technology. He is responsible for developing and maintaining the central information systems of the university. He is also in charge of the R&D team and works on new approaches to IT systems’ protection. He also acts as the project manager of two big innovative IT projects co-financed by the European Funds. He received a PhD degree in computer...
-
Validation of Services Supporting Healthcare Standards Conformance
PublicationThe paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
David Duenas Cid dr hab.
PeopleHe is an Associate Professor at Kozminski University and the director of the Pub-Tech (Public Sector Data-Driven Technologies) Research Center. Previously, he served as an H2020 Marie Skłodowska-Curie Widening Fellow at Gdansk University of Technology, as a Researcher at the Johan Skytte Institute of Political Studies of the University of Tartu, as a Postdoctoral Researcher at the Ragnar Nurkse Department of Innovation and Governance...
-
Zaufanie do siebie jako jeden z aspektów zaufania w aktywności przedsiębiorczej
PublicationArtykuł prezentuje znaczenie zaufania do samego siebie na tle zaufania w relacjach budowanych przez przedsiębiorcę w jego otoczeniu społecznym i biznesowym. Wyjaśniono koncepcję zaufania do samego siebie, odnosząc się do zróżnicowanych typów zaufania, na przykład: kalkulacyjnego, opartego na wiedzy i identyfikacyjnego. Wskazano jego potencjalne źródła i konsekwencje w kontekście budowania własnego wizerunku, podejmowania decyzji...
-
Zaufanie w zespołach pracowniczych – czy polskie zespoły są gotowe na empowerment?
PublicationZaufanie jest istotnym elementem klimatu pracy zespołowej i warunkiem budowania efektywnych zespołów, korzystających z potencjału zaangażowanych w realizację celu pracowników. Zaufanie jest też podstawą wdrażania w zespołach zasad empowermentu, rozumianego nie tylko jako przekazanie władzy członkom zespołu, ale również jako zdolność zespołu do przejmowania odpowiedzialności za realizację wybranego celu. W artykule przedstawiono...
-
Extending GQM by argument structures
PublicationEffective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Zaufanie do marek jako mediator pomiędzy postrzeganym ryzykiem i skłonnością do elektronicznego word-of-mouth
PublicationRozwój Internetu oraz dostęp konsumentów do mediów społecznościowych wpływają na ich zaangażowanie on-line. Odzwierciedla to również sposób, w jaki konsumenci wyrażają opinie o markach i produktach w Sieci. Celem ankiety było zbadanie wpływu postrzeganego ryzyka i zaufania do marki na skłonność konsumentów do electronic word-of-mouth (eWOM). Ponadto, autorzy zbadali rolę zaufania do marki jako mediatora w relacji między postrzeganym...
-
Magdalena Szuflita-Żurawska
PeopleHead of the Scientific and Technical Information Services at the Gdansk University of Technology Library and the Leader of the Open Science Competence Center. She is also a Plenipotentiary of the Rector of the Gdańsk University of Technology for open science. She is a PhD Candidate. Her main areas of research and interests include research productivity, motivation, management of HEs, Open Access, Open Research Data, information...
-
Pomiędzy kontrolą i zaufaniem – jakich liderów potrzebują wirtualne zespoły projektowe
PublicationArtykuł dotyczy zarządzania zespołem wirtualnym, które jest szczególnym wyzwaniem ze względu na rozproszenie geograficzne członków zespołu oraz porozumiewanie się za pośrednictwem technologii informacyjnej. Skoncentrowano się na utrzymywaniu odpowiedniej proporcji pomiędzy zaufaniem i kontrolą zespołu i opracowano listę rekomendacji dla liderów zespołów wirtualnych, dotyczących budowania zaufania i koordynacji pracy. Do realizacji...
-
Satish Raina prof. dr
People -
Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation
PublicationThe academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublicationW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Specification-Oriented Automatic Design of Topologically Agnostic Antenna Structure
PublicationDesign of antennas for modern applications is a challenging task that combines cognition-driven development of topology intertwined with tuning of its parameters using rigorous numerical optimization. However, the process can be streamlined by neglecting the engineering insight in favor of automatic de-termination of structure geometry. In this work, a specification-oriented design of topologically agnostic antenna is considered....
-
Zaufanie w zespole projektowym a (kobiecy) model przywództwa
PublicationArtykuł prezentuje wyniki badań dotyczące znaczenia czynników kształtujących zaufanie w pracy zespołowej, do których należą: adekwatne nagradzanie, dzielenie się informacjami, ustalone cele i zasady pracy, przejrzystość środowiska i otwarta komunikacja. Wyniki koncentrują się na zachowaniach lidera/ przywódcy, które maja wpływ na kształtowanie zaufanie w zespole i pokazują różnice w zależności od płci.
-
ADMEDVOICE Adaptive intelligent speech processing system of medical personnel with the structuring of test results and support of therapeutic process
ProjectsProject realized in Department of Multimedia Systems according to INFOSTRATEG4/0003/2022 agreement from 2023-05-04
-
On EM-driven size reduction of antenna structures with explicit constraint handling
PublicationSimulation-driven miniaturization of antenna components is a challenging task mainly due to the presence of expensive constraints, evaluation of which involves full-wave electromagnetic (EM) analysis. The recommended approach is implicit constraint handling using penalty functions, which, however, requires a meticulous selection of penalty coefficients, instrumental in ensuring optimization process reliability. This paper proposes...
-
Fast Antenna Optimization Using Gradient Monitoring and Variable-Fidelity EM Models
PublicationAccelerated simulation-driven design optimization of antenna structures is proposed. Variable-fidelity electromagnetic (EM) analysis is used as well as the trust-region framework with limited sensitivity updates. The latter are controlled by monitoring the changes of the antenna response gradients. Our methodology is verified using three compact wideband antennas. Comprehensive benchmarking demonstrates its superiority over both...
-
Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi podejście dynamiczne
PublicationAbstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...
-
Rapid design optimization of antennas using variable-fidelity EM models and adjoint sensitivities
PublicationPurpose – Development of techniques for expedited design optimization of complex and numerically expensive electromagnetic (EM) simulation models of antenna structures validated both numerically and experimentally. The paper aims to discuss these issues. Design/methodology/approach – The optimization task is performed using a technique that combines gradient search with adjoint sensitivities, trust region framework, as well as...
-
Michal Piechowicz dr
PeopleAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublicationWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Jakub Miler dr inż.
PeopleAcademic career: 2000: Master of Science - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "Computer system for supporting risk management in a software engineering project", supervisor prof. Janusz Górski 2005: PhD - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "A Method of Software Project Risk Identification and Analysis",...
-
Standard Compliance Framework for effective requirements communication
PublicationStandard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...
-
Dual-band antenna with improved gain for WLAN and ISM applications
PublicationIn this Letter, a dual-band antenna with an improved gain is proposed. The structure features 9.7 and 10.4 dBi gain within 2.4 GHz to 2.5 GHz and 5 GHz to 6 GHz bands, respectively. This makes it suitable for WLAN and ISM applications. The structure comprises an asymmetrical pair of radiators and slots suspended over a reflector. The antenna is optimised in a two-stage process using a trust-region-based gradient search algorithm....
-
Comparative conformance cases for monitoring multiple implementations of critical requirements
PublicationThe paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies
PublicationMost experts agree that truly intelligent artificial system is yet to be developed. The main issue that still remains a challenge is imposing trust and explainability into such systems. However, is full replication of human intelligence really desirable key aim in intelligence related technology and research? This is where the concept of augmented intelligence comes into play. It is an alternative conceptualization of artificial...
-
Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme
PublicationThe importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...
-
Intercultural Challenges in Virtual Teams
Publication: Virtual teams are usually geographically dispersed and consist of members from different countries and cultures. They influences internal communication processes and can cause personal conflicts, misunderstandings or lack of trust. Intercultural diversity is also significant for goal setting and team effectiveness. The aim of this article is to check if virtual team members appreciate the cultural diversity or rather suffer from lack...
-
Using argument structures to create a measurement plan
PublicationWhile planning an experiment the same question always arises: What are the goals of the experiment and which measurements are needed to demonstrate that the goals have been achieved? Deciding about the extent of raw data to be collected, the metrics to be constructed on those data and the interpretation of the metrics with respect to the assumed goals is by no means a trivial task. In this paper we show how a well known Gal-Question-Metrics...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublicationThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Tacit Knowledge Sharing and Value Creation in the Network Economy: Socially Driven Evolution of Business
PublicationKey factors which affect competitive advantage in the network economy are innovation, relationships, cooperation, and knowledge. Sharing knowledge is not easy. Companies find it problematic. Presented studies show that the essence of the value creation today is not in sharing explicit but rather tacit knowledge, which is a source of creativity and innovation. Delivering value through knowledge does not only require efficient Transactive...