Search results for: Trust
-
Trust-IT - a framework for trust cases
PublicationArtykul prezentuje wyniki uzyskane w ramach prac zmierzających do wytworzenia zintegrowanego srodowiska wspomagającego analizę zaufania do systemów i infrastruktur informatycznych. Elementy tego środowiska obejmują język i metodykę trorzenia i pielęgnacji dowodów zaufania (ang. trust case), mtode integrowania z nimi materiału dowodowego, narzędzia wspomagajace zarządzanie dowodami zaufania oraz scenariusze ich wykorzystania w różnych...
-
Trust case - a case for trustworthiness of IT infrastructures
PublicationArtykuł prezentuje podejście do budowy argumentów (trust case) uzasadniających zaufanie do systemów i infrastruktur IT. Wprowadza system pojęć związanych ze strukturą i treścią trust case, identyfikuje udziałowców trust case oraz dyskutuje możliwość wsparcia narzędziowego procesu zarządzanie trust case. Omawia równiez krótko dotychczasowe zastosowania tego podejścia.
-
Trust Case: justifying trust in an IT solution
PublicationW artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...
-
Journal of Trust Research
Journals -
Trust in Food
Publication -
Trust in Food
Publication -
Trust in Food
Publication -
Trust as a Leadership Determinant
Publication -
Trust and online retailing.
PublicationW artykule autor wprowadził rozróżnienie pomiędzy zaufaniem, jako relacją interpersonalną (RI), o zaufaniem jako relacją nieinterpersonalną (RN). Dylemat Więźnia w matematycznej teorii gier, I współpracę w społeczeństwie, B.Wiliams pokazuje logiczną strukturę wyjaśniania, jako wymagającą uzupełnienia przez nieegoistyczne mikromotywacje. Występują dwa trendy w handlu internetowym: technologia człowiek. Trend technologiczny...
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Trust and Distrust in e-Democracy
PublicationIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
An Approach to Trust Case Development
PublicationIn the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...
-
An approach for evaluating trust in it infrastructures
PublicationW artykule zademonstrowano metodę oceny poziomu zaufania do systemu TI w oparciu o podejście funkcji przekonania.
-
A Framework for Analyzing Trust in IT Systems.
PublicationProblem uzasadnienia zaufania do systemów realizowanych w technologiach informacyjnych nabiera coraz większego znaczenia wraz z poszerzaniem zakresu zastosowań takich systemów. W artykule wprowadzono koncepcje 'dowodu zaufania', który stanowi strukturę zawierająca cały materiał dowodowy wraz ze stowarzyszona z nim argumentacja uzasadniająca, ze system jest wystarczająco wiarygodny (w sensie bezpieczeństwa, zabezpieczenia, prywatności...
-
Reasoning about trust in IT infrastructures
PublicationW artykule zaprezentowano metodę pozwalającą na ilościowe określenie poziomu zaufania do systemu TI.
-
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection
PublicationWe propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...
-
Dis/Trust and data-driven technologies
PublicationThis concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...
-
Trust triggers and barriers in intercultural teams
PublicationIntercultural teams are more and more popular nowadays — they constitute a serious challenge in terms of effective cooperation and trust building, however. The article presents the potential problems that can affect intercultural cooperation and stresses the power of trust in cultural diversity conditions. The ten-factor model of intercultural team trust is presented. The main aim was to answer the questions: what are the differences...
-
An approach to evaluation of arguments in trust cases
PublicationTrustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...
-
Argument strategies and patterns of the Trust-IT framework
PublicationArtykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...
-
Combinning technologies to achieve decisional trust
PublicationW pracy zaproponowano modelowe podejście do problemu doboru i złożenia technologii informatycznych w celu osiągnięcia wysokiego poziomu zaufania w procesie podejmowania decyji.
-
Relations between law, authority, and trust
PublicationW artykule przedstawiono relacje pomiędzy prawem, autorytetem i zaufaniem. Zwrócono uwagę, że prawo, a głównie jego egzekwowanie wynika z przymusu państwowego. Pozostałe natomiast kategorie są kształtowane przez inne czynniki. Rozważania mają charakter filozoficzny.
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Using evidence based arguments to support trust
PublicationWprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Trust Models for Community- Aware Identity Managment. [....]
PublicationArtykuł przedstawia możliwości budowania zaufania pomiędzy członkami społecznych sieci współpracujacych w Internecie. Przedstawiono system informatyczne wykorzystującyna współczesą wiedzę z zakresu psychologi społecznej, umozliwiajacy tworzenie sieci społecznych w internecie.
-
Trust management in WSN - case study evaluation
Publication -
Supporting compliance with safety standards by trust case templates
PublicationStandard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...
-
A theoretical framework for understanding trust and distrust in internet voting
PublicationEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
Representing and appraising Toulmin model arguments in trust cases
PublicationThe paper presents a Toulmin-based argument model used in trust cases, which allows to argue various properties of IT systems. Argument patterns encountered in trust cases are discussed together with some real-life examples. A method of argument appraisal is introduced together with the corresponding aggregation mechanism. Practical applications of trust cases in industrial and research projects are outlined.
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Distributed Trust Management Model for Wireless Sensor Networks
Publication -
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
How can we justify trust in software based systems?
PublicationArtykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).
-
Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty
PublicationThis paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...
-
The importance of trust and altruistic social orientation for COVID-19 distress
PublicationBackground: The COVID-19 pandemic, the biggest global health crisis in decades, has been a difficult experience for nations all over the world. In the present study we wanted to assess to what extent a positive attitude towards others, expressed in altruistic social orientation and a high level of trust, would be linked to lower levels of COVID-19 distress in infected and non-infected individuals. Participants and procedure:...
-
The effects of perceived risk, brand value, and brand trust on eWOM
PublicationUnrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...
-
Trust, Tacit Knowledge Sharing, Project Performance and their Managerial Implications
PublicationTacit Knowledge Sharing is increasingly attracting the attention of scientists and managers intrigued by their potential application for creating innovative solutions. Project management as a set of methodologies and best practices need to be charged by knowledge. The research problem tackled in this article refers to a current managerial problem regarding tacit knowledge sharing execution in project based organizations. The objective...
-
Economic Crisis, Trust and Socio-Economic Aspects of Sustainable Development
PublicationW artykule podjęto tematykę relacji pomiędzy kryzysem ekonomicznym i kryzysem zaufania. Omówiono elementy kreujące i destruktywne w procesie budowy zaufania w gospodarce. Przedstawiono konsekwencje wynikające z zachowań uczestników procesów ekonomicznych oraz relacje zachodzące pomiędzy statusem materialnym inwestorów, a akceptowaniem przez nich wyższego poziomu ryzyka i spadkiem zaufania do systemu ekonomicznego. Wskazano istotność...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing
PublicationThe literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...
-
The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation
PublicationIn this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...
-
Trust in Electronic Word-of-Mouth (eWOM): the concept and the most important determinants
PublicationeWOM and trust in it is now the most important factor in determining buyers' purchasing behavior. Familiarity with the determinants of trust establishes the formation of appropriate marketing activities. However, the growing number of new forms of eWOM and its increasingly complex and multidimensional nature have created a lot of confusion. The article aims to organize the concepts related to trust in eWOM, to indicate the most...
-
Praca z normą Common Criteria wspomagana szablonami Trust Case
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
A method of trust case templates to support standards conformity achievement and assessment
PublicationOsiąganie i ocena zgodności ze standardami stanowi poważne obciążenie finansowe dla współczesnych gospodarek. Pomimo znacznej wagi tego problemu, nie znalazł on jednak zadowalającego przełożenia na rozwiązania dostępne na rynku. W tej pracy zaproponowano metodę nazwaną Standards Conformity Framework (SCF), która wspiera stosowanie standardów. Jest ona oparta na spostrzeżeniu, że osiąganie i ocena zgodności ze standardem polega...
-
Network relationship’s transformation as the effect of the development of trust in cooperation with a foreign partner
Publication -
Using Dempster-Shafer approach to support reasoning about trust in IT infrastructures
PublicationW artykule przedstawiono zastosowanie podejścia Dempstera-Shafera do do wnioskowania o poziomie zaufania do infrastruktur TI.
-
Trust, Collaborative Culture and Tacit Knowledge Sharing in Project Management–a Relationship Model
PublicationThe aim of this research is to study the relationship between Trust, Collaborative Culture, and Tacit Knowledge Sharing in Project Management as a source of Team Creativity in the context of delivering value through knowledge. For this purpose authors conducted a study of 514 Polish professionals with different functions and experience in managing projects in construction industry. The data collected during the study has been analysed...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublicationThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Molecular dynamics and verisimilitude - to what extent can one trust a computational simulation?
PublicationFor the last several tens of years, computer simulations have become of undeniable importance. Molecular Dynamics (MD) simulation techniques are used to examine the phenomena which occur at the level that cannot be observed directly. Thus, they can be successfully exploited in many different scientific fields such as: materials science, applied mathematics and theoretical physics, biochemistry, biophysics or drug design. Despite...
-
Design centering of compact microwave components using response features and trust regions
PublicationFabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...
-
Using trust management model for detection of faulty nodes in Wireless Sensor Networks
Publication -
Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19
PublicationA vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...
-
Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling
PublicationIn the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Expedited Trust-Region-Based Design Closure of Antennas by Variable-Resolution EM Simulations
PublicationThe observed growth in the complexity of modern antenna topologies fostered a widespread employment of numerical optimization methods as the primary tools for final adjustment of the system parameters. This is mainly caused by insufficiency of traditional design closure approaches, largely based on parameter sweeping. Reliable evaluation of complex antenna structures requires full-wave electromagnetic (EM) analysis. Yet, EM-driven...
-
Trust in the source of received information as a factor related to public perception of shale gas drilling
Publication -
Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?
PublicationNational surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...
-
Fast EM-driven size reduction of antenna structures by means of adjoint sensitivities and trust regions
PublicationIn this letter, a simple yet robust and computationally efficient optimization technique for explicit size reduction of antenna structures is presented. Our approach directly handles the antenna size as the main design objective, while ensuring satisfactory electrical performance by means of suitably defined penalty functions. For the sake of accuracy, the antenna structure is evaluated using high-fidelity EM simulation. In order...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
A Novel Trust-Region-Based Algorithm with Flexible Jacobian Updates for Expedited Optimization of High-Frequency Structures
PublicationSimulation-driven design closure is mandatory in the design of contemporary high-frequency components. It aims at improving the selected performance figures through adjustment of the structure’s geometry (and/or material) parameters. The computational cost of this process when employing numerical optimization is often prohibitively high, which is a strong motivation for the development of more efficient methods. This is especially...
-
EM-Driven Multi-Objective Optimization of a Generic Monopole Antenna by Means of a Nested Trust-Region Algorithm
PublicationAntenna structures for modern applications are characterized by complex and unintuitive topologies that are difficult to develop when conventional experience-driven techniques are of use. In this work, a method for automatic generation of antenna geometries in a multi-objective setup has been proposed. The approach involves optimization of a generic spline-based radiator with adjustable number of parameters using a nested trust-region-based...
-
Expedited Design Closure of Antenna Input Characteristics by Trust Region Gradient Search and Principal Component Analysis
PublicationOptimization-based parameter tuning has become an inherent part of contemporary antenna design process. For the sake of reliability, it is typically conducted at the level of full-wave electromagnetic (EM) simulation models. This may incur considerable computational expenses depending on the cost of an individual EM analysis, the number of adjustable variables, the type of task (local, global, single-/multi-objective optimization),...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublicationTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs
PublicationPrzedstawiono ramy wymiany informacji reputacyjnej pomiędzy terminalami sieci mobilnej ad hoc lub sensorowej, prowadzące do efektywnej lokalizacji terminali egoistycznych i jednocześnie zapobiegające skutkom fałszywych rekomendacji. Integrację miar zaufania i rekomendacji reputacyjnych oparto na teorii Dempstera-Shafera.
-
Exploring COVID-19 Conspiracy Theories: Education, Religiosity, Trust in Scientists, and Political Orientation in 26 European countries
PublicationThe COVID-19 virus disseminated globally at an accelerated pace, culminating in a worldwide pandemic; it engendered a proliferation of spurious information and a plethora of misinformation and conspiracy theories (CTs). While many factors contributing to the propensity for embracing conspiracy ideation have been delineated, the foremost determinant influencing individuals’ proclivity towards CT endorsement appears to be their...
-
Reduced-cost constrained miniaturization of wideband antennas using improved trust-region gradient search with repair step
PublicationIn the letter, an improved algorithm for electromagnetic (EM)-driven size reduction of wideband antennas is proposed. Our methodology utilizes variable-fidelity EM simulation models, auxiliary polynomial regression surrogates, as well as multi-point response correction. The constraint handling is implicit, using penalty functions. The core optimization algorithm is a trust-region gradient search with a repair step added in order...
-
Exploring COVID-19 conspiracy theories: education, religiosity, trust in scientists, and political orientation in 26 European countries
Publication -
Reduced-cost electromagnetic-driven optimisation of antenna structures by means of trust-region gradient-search with sparse Jacobian updates
PublicationNumerical optimisation plays more and more important role in the antenna design. Because of lack of design-ready theoretical models, electromagnetic (EM)-simulation-driven adjustment of geometry parameters is a necessary step of the design process. At the same time, traditional parameter sweeping cannot handle complex topologies and large number of design variables. On the other hand, high computational cost of the conventional...
-
SPIRITUALITY AND JOB SATISFACTION. MEDIATING ROLE OF STRESS, GRATITUDE TOWARDS ORGANIZATION AND TRUST IN SUPERVISOR. MODERATING ROLE OF RELIGIOUS PRACTICES
Publication -
Trusts & Trustees
Journals -
Numerical optimization of planar antenna structures using trust-region algorithm with adaptively adjusted finite differences
Open Research DataThe dataset contains initial designs and optimization results for three planar structures that include quasi-patch antenna for WLAN applications, compact spline-parameterized monopole dedicated for ultra-wideband applications, as well as rectifier for energy harvesting with enhanced bandwidth. The numerical results for the first two structures are also...
-
International Journal of Trust Management in Computing and Communications
Journals -
International Conference on Trust Management
Conferences -
International Journal of Security, Privacy an d Trust Management
Journals -
International Conference on Principles of Security and Trust
Conferences -
Annual Conference on Privacy, Security and Trust
Conferences -
International Conference on Trust, Privacy and Security in Digital Business
Conferences -
Collaborative approach to trustworthiness of it infrastructures
PublicationArtykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...
-
International Conference on Trust, Security and Privacy in Computing and Communications (IEEE/IFIP International Symposium on Trusted Computing and Communications)
Conferences -
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublicationW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
Electrust Electrust: Dynamics of Trust and Distrust Creation in Internet Voting
ProjectsProject realized in Gdasnk university of technology according to 101038055 agreement from 2021-04-22
-
Focused crawler for trustworthy healthcare information search
PublicationArtykuł zawiera opis prac wykonanych w projekcie 6 Programu Ramowego Unii Europejskiej: Personalised Information Platform for life and health Services (PIPS). Głównym celem projektu jest zapewnienie obywatelowi Unii kompleksowego wspomagania w zakresie zagadnień ochrony zdrowia oraz odżywiania. Do realizacji tego celu konieczne jest pozyskanie i dostarczenie obywatelowi wiarygodnej, prawdziwej i aktualnej informacji z tych dziedzin....
-
Defining trustworthiness in Semantic Web by ontological assertions
PublicationW artykule opisano model systemu zarządzania wiedzą z uwzględnieniem aspektów wiarygodności. Zaproponowano również metodę definiowania wiarygodności w Sieci Semantycznej i wnioskowania z wiedzy wzbogaconej o opis jej wiarygodności. Opisana metoda dostarcza sposobu wzbogacenia ontologii o opis wiarygodności asercji zdefiniowanych w tej ontologii. Definiowanie wiarygodności jest rozumiane jako przypisanie zbioru cech do asercji binarnych...
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
Real estate investment trusts in Turkey: Structure, analysis, and strategy
PublicationPurpose-Aim of this study is to make the determinations related to the problems mentioned in the REIT sector in Turkey, to offer a solution for this issue, and to ensure the classification in the sector by adhering to the financial data of the REITsMethodology-Financial data set of the REITs was firstly standardized by using median instead of mean. Then, the scoring was performed according to defined coefficients....
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Information Assurance Group (IAG)
Research TeamsGrupa koncentruje się na zarządzaniu ryzykiem i zaufaniem w odniesieniu do różnych cech oprogramowania i systemów informatycznych, np. Bezpieczeństwa, niezawodności i prywatności. Szczególnie interesujące jest pojęcie Trust Case i powiązanej metodologii Trust-it.
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Trustee : the journal for hospital governing boards
Journals -
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
TrustPublSM DETERMINING THE TRUSTWORTHINESS OF PUBLIC INFORMATION ON SOCIAL MEDIA USING LINGUISTIC-BASED TEXT ANALYTICS APPROACH
ProjectsProject realized in Department of Informatics in Management
-
IAVoSS Workshop On Trustworthy Elections
Conferences -
International Conference on Advanced and Trusted Computing (International Conference on Autonomic and Trusted Computing)
Conferences -
ACM Workshop on Scalable Trusted Computing
Conferences -
Helicobacter muridarum sp. nov., a Microaerophilic Helical Bacterium with a Novel Ultrastructure Isolated from the Intestinal Mucosa of Rodents
Publication