Search results for: Trust - Bridge of Knowledge

Search

Search results for: Trust

Search results for: Trust

  • Trustworthy Interfaces for Passwords and Personal Information workshop

    Conferences

  • Compliance with the restrictions during the COVID-19 pandemic in Poland and Sweden

    Open Research Data
    open access
    • K. Adamska dr hab.
    • D. Sendlak Brundin
    • P. Jurek

    Our study is aimed to check if the difference between Sweden and Poland in trust is related to negative affective reactions to authorities and law antipathy being manifestations of lack of trust and related to value-based legitimacy, behavioral legitimacy and prosocial justification of compliance with the restrictions put on citizens to limit the spread...

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...

  • Zaufanie w zespole badawczym – studium przypadku (projekt CD NIWA realizowany na Politechnice Gdańskiej)

    Publication

    - Year 2016

    Artykuł dotyczy tematyki klimatu pracy zespołowej, ze szczególnym uwzględnieniem zaufania w zespole jako czynnika warunkującego zaangażowanie, efektywność i innowacyjność zespołu. Przeanalizowano znaczenie oraz wymiary zaufania w zespole badawczym na podstawie koncepcji International Team Trust Indicator, czyli dziesięciowymiarowego modelu zaufania. Celem artykułu jest analiza klimatu współpracy i poziomu zaufania w interdyscyplinarnym...

    Full text to download in external service

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • Paweł Lubomski dr inż.

    People

    Paweł Lubomski is the director of the IT Services Centre at the Gdańsk University of Technology. He is responsible for developing and maintaining the central information systems of the university. He is also in charge of the R&D team and works on new approaches to IT systems’ protection. He also acts as the project manager of two big innovative IT projects co-financed by the European Funds. He received a PhD degree in computer...

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Full text available to download

  • Zaufanie do siebie jako jeden z aspektów zaufania w aktywności przedsiębiorczej

    Publication

    - Year 2015

    Artykuł prezentuje znaczenie zaufania do samego siebie na tle zaufania w relacjach budowanych przez przedsiębiorcę w jego otoczeniu społecznym i biznesowym. Wyjaśniono koncepcję zaufania do samego siebie, odnosząc się do zróżnicowanych typów zaufania, na przykład: kalkulacyjnego, opartego na wiedzy i identyfikacyjnego. Wskazano jego potencjalne źródła i konsekwencje w kontekście budowania własnego wizerunku, podejmowania decyzji...

  • Zaufanie w zespołach pracowniczych – czy polskie zespoły są gotowe na empowerment?

    Zaufanie jest istotnym elementem klimatu pracy zespołowej i warunkiem budowania efektywnych zespołów, korzystających z potencjału zaangażowanych w realizację celu pracowników. Zaufanie jest też podstawą wdrażania w zespołach zasad empowermentu, rozumianego nie tylko jako przekazanie władzy członkom zespołu, ale również jako zdolność zespołu do przejmowania odpowiedzialności za realizację wybranego celu. W artykule przedstawiono...

    Full text available to download

  • Magdalena Szuflita-Żurawska

    Head of the Scientific and Technical Information Services at the Gdansk University of Technology Library and the Leader of the Open Science Competence Center. She is also a Plenipotentiary of the Rector of the Gdańsk University of Technology for open science.  She is a PhD Candidate. Her main areas of research and interests include research productivity, motivation, management of HEs, Open Access, Open Research Data, information...

  • David Duenas Cid dr hab.

    People

    He is an Associate Professor at Kozminski University and the director of the Pub-Tech (Public Sector Data-Driven Technologies) Research Center.  Previously, he served as an H2020 Marie Skłodowska-Curie Widening Fellow at Gdansk University of Technology, as a Researcher at the Johan Skytte Institute of Political Studies of the University of Tartu, as a Postdoctoral Researcher at the Ragnar Nurkse Department of Innovation and Governance...

  • Practical Evaluation of Internet Systems' Security Mechanisms

    Publication

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Full text available to download

  • Zaufanie do marek jako mediator pomiędzy postrzeganym ryzykiem i skłonnością do elektronicznego word-of-mouth

    Publication

    - Handel Wewnętrzny - Year 2017

    Rozwój Internetu oraz dostęp konsumentów do mediów społecznościowych wpływają na ich zaangażowanie on-line. Odzwierciedla to również sposób, w jaki konsumenci wyrażają opinie o markach i produktach w Sieci. Celem ankiety było zbadanie wpływu postrzeganego ryzyka i zaufania do marki na skłonność konsumentów do electronic word-of-mouth (eWOM). Ponadto, autorzy zbadali rolę zaufania do marki jako mediatora w relacji między postrzeganym...

    Full text available to download

  • Pomiędzy kontrolą i zaufaniem – jakich liderów potrzebują wirtualne zespoły projektowe

    Artykuł dotyczy zarządzania zespołem wirtualnym, które jest szczególnym wyzwaniem ze względu na rozproszenie geograficzne członków zespołu oraz porozumiewanie się za pośrednictwem technologii informacyjnej. Skoncentrowano się na utrzymywaniu odpowiedniej proporcji pomiędzy zaufaniem i kontrolą zespołu i opracowano listę rekomendacji dla liderów zespołów wirtualnych, dotyczących budowania zaufania i koordynacji pracy. Do realizacji...

    Full text available to download

  • Satish Raina prof. dr

  • Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - TELEMATICS AND INFORMATICS - Year 2024

    The academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...

    Full text to download in external service

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publication

    - Year 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Full text available to download

  • Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku

    W artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...

  • Zaufanie w zespole projektowym a (kobiecy) model przywództwa

    Artykuł prezentuje wyniki badań dotyczące znaczenia czynników kształtujących zaufanie w pracy zespołowej, do których należą: adekwatne nagradzanie, dzielenie się informacjami, ustalone cele i zasady pracy, przejrzystość środowiska i otwarta komunikacja. Wyniki koncentrują się na zachowaniach lidera/ przywódcy, które maja wpływ na kształtowanie zaufanie w zespole i pokazują różnice w zależności od płci.

    Full text available to download

  • ADMEDVOICE Adaptive intelligent speech processing system of medical personnel with the structuring of test results and support of therapeutic process

    Projects

    Project manager: prof. dr hab. inż. Andrzej Czyżewski   Financial Program Name: INFOSTRATEG

    Project realized in Department of Multimedia Systems according to INFOSTRATEG4/0003/2022 agreement from 2023-05-04

  • On EM-driven size reduction of antenna structures with explicit constraint handling

    Publication

    Simulation-driven miniaturization of antenna components is a challenging task mainly due to the presence of expensive constraints, evaluation of which involves full-wave electromagnetic (EM) analysis. The recommended approach is implicit constraint handling using penalty functions, which, however, requires a meticulous selection of penalty coefficients, instrumental in ensuring optimization process reliability. This paper proposes...

    Full text available to download

  • Fast Antenna Optimization Using Gradient Monitoring and Variable-Fidelity EM Models

    Accelerated simulation-driven design optimization of antenna structures is proposed. Variable-fidelity electromagnetic (EM) analysis is used as well as the trust-region framework with limited sensitivity updates. The latter are controlled by monitoring the changes of the antenna response gradients. Our methodology is verified using three compact wideband antennas. Comprehensive benchmarking demonstrates its superiority over both...

  • Rapid design optimization of antennas using variable-fidelity EM models and adjoint sensitivities

    Publication

    - ENGINEERING COMPUTATIONS - Year 2016

    Purpose – Development of techniques for expedited design optimization of complex and numerically expensive electromagnetic (EM) simulation models of antenna structures validated both numerically and experimentally. The paper aims to discuss these issues. Design/methodology/approach – The optimization task is performed using a technique that combines gradient search with adjoint sensitivities, trust region framework, as well as...

    Full text to download in external service

  • Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi  podejście dynamiczne

    Abstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...

  • Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions

    Publication

    - Year 2018

    We consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...

    Full text available to download

  • SCF - a Framework Supporting Achieving and Assessing Conformity with Standards

    Standards Conformity Framework (SCF) presented in this paper encompasses methods and tools whichprovide support for application of standards and other normative documents. The approach taken focuses ondevelopment, assessment and maintenance of an electronic document which demonstrates conformity. Sucha document contains an argument structure developed in accordance with the Trust-IT methodology. Thepaper discusses details of the...

    Full text to download in external service

  • Standard Compliance Framework for effective requirements communication

    Standard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...

  • Comparative conformance cases for monitoring multiple implementations of critical requirements

    Publication

    The paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...

    Full text available to download

  • Dual-band antenna with improved gain for WLAN and ISM applications

    Publication

    In this Letter, a dual-band antenna with an improved gain is proposed. The structure features 9.7 and 10.4 dBi gain within 2.4 GHz to 2.5 GHz and 5 GHz to 6 GHz bands, respectively. This makes it suitable for WLAN and ISM applications. The structure comprises an asymmetrical pair of radiators and slots suspended over a reflector. The antenna is optimised in a two-stage process using a trust-region-based gradient search algorithm....

    Full text to download in external service

  • Jakub Miler dr inż.

    Academic career: 2000: Master of Science - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "Computer system for supporting risk management in a software engineering project", supervisor prof. Janusz Górski 2005: PhD - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "A Method of Software Project Risk Identification and Analysis",...

  • Validation of Services Supporting Healthcare Standards Conformance

    The paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...

    Full text available to download

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publication

    - Year 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2022

    Most experts agree that truly intelligent artificial system is yet to be developed. The main issue that still remains a challenge is imposing trust and explainability into such systems. However, is full replication of human intelligence really desirable key aim in intelligence related technology and research? This is where the concept of augmented intelligence comes into play. It is an alternative conceptualization of artificial...

    Full text available to download

  • Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme

    The importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...

    Full text available to download

  • Using argument structures to create a measurement plan

    While planning an experiment the same question always arises: What are the goals of the experiment and which measurements are needed to demonstrate that the goals have been achieved? Deciding about the extent of raw data to be collected, the metrics to be constructed on those data and the interpretation of the metrics with respect to the assumed goals is by no means a trivial task. In this paper we show how a well known Gal-Question-Metrics...

  • Intercultural Challenges in Virtual Teams

    : Virtual teams are usually geographically dispersed and consist of members from different countries and cultures. They influences internal communication processes and can cause personal conflicts, misunderstandings or lack of trust. Intercultural diversity is also significant for goal setting and team effectiveness. The aim of this article is to check if virtual team members appreciate the cultural diversity or rather suffer from lack...

    Full text available to download

  • To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting

    Publication

    - Year 2021

    This paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...

    Full text available to download

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text to download in external service

  • Low-fidelity model considerations for simulation-based optimisation of miniaturised wideband antennas

    Publication

    Here, variable-fidelity electromagnetic (EM)-based design optimisation of miniaturised antennas is discussed. The authors focus on an appropriate selection of discretisation density of the low-fidelity EM model, which results in good performance of the optimisation algorithm in terms of its computational complexity and reliability. Trust-region gradient search with low-fidelity model corrected by means of non-linear frequency scaling...

    Full text to download in external service

  • On low-fidelity models for variable-fidelity simulation-driven design optimization of compact wideband antennas

    Publication

    - Year 2018

    The paper addresses simulation-driven design optimization of compact antennas involving variable-fidelity electromagnetic (EM) simulation models. Comprehensive investigations are carried out concerning selection of the coarse model discretization density. The effects of the low-fidelity model setup on the reliability and computational complexity of the optimization process are determined using a benchmark set of three ultra-wideband...

    Full text available to download

  • Tacit Knowledge Sharing and Value Creation in the Network Economy: Socially Driven Evolution of Business

    Publication

    - Year 2018

    Key factors which affect competitive advantage in the network economy are innovation, relationships, cooperation, and knowledge. Sharing knowledge is not easy. Companies find it problematic. Presented studies show that the essence of the value creation today is not in sharing explicit but rather tacit knowledge, which is a source of creativity and innovation. Delivering value through knowledge does not only require efficient Transactive...

    Full text to download in external service

  • Otwarte innowacje w inicjatywach klastrowych

    Publication

    - PRZEGLĄD ORGANIZACJI - Year 2019

    Specyfika funkcjonowania inicjatyw klastrowych czyni z nich idealne podłoże do wcielania w życie idei open innovation – ułatwiają bowiem nawiązywanie kontaktów z innymi podmiotami, stawiają na otwartość swoich członków i budowę relacji opartych na zaufaniu, stanowią platformę wymiany zasobów (w tym przede wszystkim informacji i wiedzy) oraz wspólnego kreowania rozwiązań innowacyjnych. W artykule podjęto rozważania teoretyczne dotyczące...

    Full text available to download

  • Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments

    Publication

    - IEEE Access - Year 2020

    Lack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...

    Full text available to download

  • How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects

    Publication
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - Year 2023

    Open Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...

    Full text available to download

  • Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War

    Publication
    • J. Kreft
    • M. Boguszewicz-kreft
    • D. Hliebova

    - Journalism Practice - Year 2023

    In this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...

    Full text to download in external service

  • Complementary green analytical procedure index (ComplexGAPI) and software

    Publication

    It is not easy to find appropriate tools for the evaluation of the “green”nature of analytical methodologies which involve the use of compounds, materials, or chemicals manufactured prior to the analytical step. Here, we propose a new metric for the evaluation of analytical procedures based on the GAC attributes. The proposed solution expands on the well-known green analytical procedure index by adding additional fields pertaining...

    Full text available to download

  • Extending GQM by argument structures

    Publication

    - Year 2007

    Effective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...

  • Extending GQM by Argument Structures

    Publication

    - Year 2008

    Effective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...

  • Informal projects management with volunteers participation

    The article briefly presents some experiences and results of research which has been conducted in order to identify key elements influencing the success of projects managed in informal way with volunteers’ participation. These experiences were collected during the realization of several “soft” projects. The general aims of these projects were sports competitions’ organisation, cultural events and charity projects for...

    Full text to download in external service

  • Problem wspólnotowego kształtowania środowiska mieszkaniowego

    Publication

    - Year 2011

    Community based shaping of housing environmentA sustainable development of housing environment depends on socio-economical context. Interest towards locality in western countries has a completely different basis than in the post-communist ones. Social capital, which shows e.g. in trust, as well as ecological awareness are totally different. We do not belong to saturated societies. There is a distinct issue of community shaping...