Filtry
wszystkich: 239
-
Katalog
Wyniki wyszukiwania dla: trust, distrust, e-democracy, internet voting, privacy, security, perception
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
A theoretical framework for understanding trust and distrust in internet voting
PublikacjaEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
David Duenas Cid dr hab.
OsobyHe is an Associate Professor at Kozminski University and the director of the Pub-Tech (Public Sector Data-Driven Technologies) Research Center. Previously, he served as an H2020 Marie Skłodowska-Curie Widening Fellow at Gdansk University of Technology, as a Researcher at the Johan Skytte Institute of Political Studies of the University of Tartu, as a Postdoctoral Researcher at the Ragnar Nurkse Department of Innovation and Governance...
-
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublikacjaThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublikacjaA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Safeguarding democracy during pandemics. Social distancing, postal, or internet voting—the good, the bad, or the ugly?
PublikacjaDuring a pandemic, many countries and organizations must decide whether to postpone upcoming elections or to hold them (Krimmer et al., 2020a). If the decision is made to hold the election, three main scenarios come to mind: continue using the existing system but include measures to ensure the health of participants; or look for alternatives among remote voting channels which could ensure social distancing is guaranteed either...
-
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublikacjaW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublikacjaThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Bidirectional voting and continous voting concepts as possible use of Internet in democratic voting process
PublikacjaDemocracies need elections for choosing their authorities and governments.This process has many factors that shape today's procedures. However, the Internet is a medium that may change possibilities and elections. The main issue is concern on how changes may influence the whole democratic process. this paper shows two possible ideas - that of bidirectional voting and continous voting., and considers possible reasons for introducing...
-
Analyzing Preconditions to Introduce Internet Voting in Portugal: Insights from the Estonian Model
PublikacjaInternet voting has been trialed or introduced for several countries, including Norway, Portugal, United States, United Kingdom and Switzerland as an additional voting channel to increase voter turnout and, also to modernize the electoral process. However, only Estonia has successful introduced internet voting, deploying e-enabled elections in general governmental levels. This paper aims to provide an exploratory study on the Estonian...
-
Tripped at the Finishing Line: The Åland Islands Internet Voting Project
PublikacjaThe Åland Islands spent years preparing an internet voting system, to be implemented for the first time in October 2019 for Parliamentary Elections. Despite this, the project was canceled the evening before the expected release date. In this paper, we explore the causes of this failure using a two-pronged approach including Information System failure perspectives and the approach to e-voting Mirabilis, focusing on organizational...
-
New methodology for calculating cost-efficiency of different ways of voting: is internet voting cheaper?
PublikacjaNew ways of voting in elections are being sought by electoral administrations worldwide who want to reverse declining voter turnouts without increasing electoral budgets. This paper presents a novel approach to cost accounting for multi-channel elections based on local elections in Estonia. By doing so, it addresses an important gap in the academic literature in this field. The authors confirm that internet voting was most cost-efficient...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Democracy & Security
Czasopisma -
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Security and Privacy
Czasopisma -
Determinants of Internet use regarding shopping preferences, COVID-19 pandemic occurrence, perception of security and Internet marketing – a case study of Poland
Publikacja -
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublikacjaAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
Internet photogrammetry as a tool for e-learning
PublikacjaAlong with Internet development, there were interactive applications which allow for remote sensing and photogrammetric analysis. An example of an application that can provide Earth images and make it possible to measure distances in these images is Google Earth. The authors, who have experience from 2001-2015 argue that it is possible and it is important to create more advanced photogrammetric network applications. In this there...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublikacjaOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
ACM Transactions on Privacy and Security
Czasopisma -
Consumer Trust in Online Advertising - How Negative Perception Impacts its Effectiveness
Publikacja -
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublikacjaUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Trust in the source of received information as a factor related to public perception of shale gas drilling
Publikacja -
Krzysztof Gierłowski dr inż.
OsobyKrzysztof Gierłowski uzyskał tytuł doktora inżyniera telekomunikacji na Wydziale Elektroniki, Telekomunikacji i Informatyki w 2018 roku. Jest autorem lub współautorem ponad 80 publikacji naukowych oraz recenzentem wielu czasopism i konferencji. Brał udział w szeregu projektów badawczych dotyczących tematyki IT, wliczając w to: finansowany ze źródeł UE projekt Inżynieria Internetu Przyszłości, projekt infrastrukturalny PL-LAB2020,...
-
International Journal of Information Security and Privacy
Czasopisma -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublikacjaW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Mesh-based internet on the Baltic sea for improving e-navigation services. A case study
Publikacja -
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Journal of Internet Services and Information Security
Czasopisma -
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
International Journal of Security, Privacy an d Trust Management
Czasopisma -
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publikacja -
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3–6, 2023, Proceedings
Publikacja -
Technology and democracy: the who and how in decision-making. The cases of Estonia and Catalonia
PublikacjaThis paper focuses on the use of technology to improve democracy, comparing the cases of Estonia and Catalonia. Both examples are closely related in their use of technology to further democratize the decision-making processes but have opposite starting points. Estonia’s internet voting system is an offshoot of the comprehensive e-governance system developed by the Estonian government. It is meant to make it more convenient for...
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Annual Conference on Privacy, Security and Trust
Konferencje -
IEEE SECURITY & PRIVACY
Czasopisma -
E-learning przez Internet w szkolnictwie wyższym. Doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej.
PublikacjaOpisano cztery podstawowe rodzaje e-learningu, przedstawiono strukturę funkcjonalną systemów zarządzania nauczaniem na odległość i zarządzania treścią nauczania (ang. LMS, LCMS) oraz zaprezentowano doświadczenia Szkoły Głównej Handlowej w Warszawie i Politechniki Gdańskiej w nauczaniu na odległość.
-
Workshop on Security and Privacy in e-Commerce
Konferencje -
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
Dis/Trust and data-driven technologies
PublikacjaThis concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...
-
Paweł Lubomski dr inż.
OsobyAbsolwent Politechniki Gdańskiej. Po zebraniu doświadczeń jako analityk systemowy i biznesowy w dużych korporacjach IT wrócił na uczelnię, gdzie aktualnie pracuje na stanowisku Dyrektora Centrum Usług Informatycznych. Naukowo specjalizuje się w zagadnieniach bezpieczeństwa i niezawodności dużych rozproszonych systemów usługowych oraz budową bezpiecznych i wydajnych architektur IT, a także projektowania architektur chmurowych oraz...
-
International Conference on Trust, Privacy and Security in Digital Business
Konferencje -
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Karol Zdzisław Zalewski mgr inż.
Osoby