37,949 research outputs found

    A Personalized Framework for Trust Assessment

    No full text
    The number of computational trust models has been increasing quickly in recent years yet their applications for automating trust evaluation are still limited. The main obstacle is the difficulties in selecting a suitable trust model and adapting it for particular trust modeling requirements, which varies greatly due to the subjectivity of human trust. The Personalized Trust Framework (PTF) presented in this paper aims to address this problem by providing a mechanism for human users to capture their trust evaluation process in order for it to be replicated by computers. In more details, a user can specify how he selects a trust model based on information about the subject whose trustworthiness he needs to evaluate and how that trust model is configured. This trust evaluation process is then automated by the PTF making use of the trust models flexibly plugged into the PTF by the user. By so doing, the PTF enable users reuse and personalize existing trust models to suit their requirements without having to reprogram those models

    Antecedents of trust across foci: a comparative study of Turkey and China

    Get PDF
    Instead of importing Western models of interpersonal trust, we adopted a qualitative approach to understand trust relationships from indigenous cultures' perspectives. We examined trust relationships directed at different foci in the organization (supervisor, peer, and subordinate) in two different countries, Turkey and China. Semi-structured interviews were conducted with 30 Turkish and 30 Chinese employees working for a variety of large-scale organizations located in Istanbul, Turkey and Shenzhen, China. We report the content analysis of trust-building critical incidents narrated by the respondents. While the general antecedents of Ability, Benevolence, and Integrity were found to exist in both countries, Benevolence, with its culture-specific manifestations, played a very important role in trust-building across multiple foci in both countries. We also found that trust relationships in these two contexts tended to go beyond the professional domain, and to involve sharing of personal time, information, and space. Drawing on this evidence, we propose a trust-building process that is more affective in nature and which straddles both work and non-work domains

    Designing an Adaptive Web Navigation Interface for Users with Variable Pointing Performance

    Get PDF
    Many online services and products require users to point and interact with user interface elements. For individuals who experience variable pointing ability due to physical impairments, environmental issues or age, using an input device (e.g., a computer mouse) to select elements on a website can be difficult. Adaptive user interfaces dynamically change their functionality in response to user behavior. They can support individuals with variable pointing abilities by 1) adapting dynamically to make element selection easier when a user is experiencing pointing difficulties, and 2) informing users about these pointing errors. While adaptive interfaces are increasingly prevalent on the Web, little is known about the preferences and expectations of users with variable pointing abilities and how to design systems that dynamically support them given these preferences. We conducted an investigation with 27 individuals who intermittently experience pointing problems to inform the design of an adaptive interface for web navigation. We used a functional high-fidelity prototype as a probe to gather information about user preferences and expectations. Our participants expected the system to recognize and integrate their preferences for how pointing tasks were carried out, preferred to receive information about system functionality and wanted to be in control of the interaction. We used findings from the study to inform the design of an adaptive Web navigation interface, PINATA that tracks user pointing performance over time and provides dynamic notifications and assistance tailored to their specifications. Our work contributes to a better understanding of users' preferences and expectations of the design of an adaptive pointing system

    Liquid FM: Recommending Music through Viscous Democracy

    Get PDF
    Most modern recommendation systems use the approach of collaborative filtering: users that are believed to behave alike are used to produce recommendations. In this work we describe an application (Liquid FM) taking a completely different approach. Liquid FM is a music recommendation system that makes the user responsible for the recommended items. Suggestions are the result of a voting scheme, employing the idea of viscous democracy. Liquid FM can also be thought of as the first testbed for this voting system. In this paper we outline the design and architecture of the application, both from the theoretical and from the implementation viewpoints

    Implementing the Leader Development That Counts

    Get PDF
    Effective leader development is too often the first casualty of high demands placed on leaders, from corporate America to the U.S. military. A comparison of these entities’ common leader development programs and workforce feedback reveals insufficient strategies and competing priorities. Organizations succumbing to these obstacles unknowingly find themselves trapped in adverse cycles of leadership development, perpetuating undernourished talent and mediocre performance. This problem will not fix itself. Organizations must refocus efforts to understand and implement a leader driven, interpersonally focused, and culturally ingrained brand of leader development to maximize available talent in crafting their envisioned organization

    Privacy in the Genomic Era

    Get PDF
    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward
    corecore