37,949 research outputs found
A Personalized Framework for Trust Assessment
The number of computational trust models has been increasing quickly in recent years yet their applications for automating trust evaluation are still limited. The main obstacle is the difficulties in selecting a suitable trust model and adapting it for particular trust modeling requirements, which varies greatly due to the subjectivity of human trust. The Personalized Trust Framework (PTF) presented in this paper aims to address this problem by providing a mechanism for human users to capture their trust evaluation process in order for it to be replicated by computers. In more details, a user can specify how he selects a trust model based on information about the subject whose trustworthiness he needs to evaluate and how that trust model is configured. This trust evaluation process is then automated by the PTF making use of the trust models flexibly plugged into the PTF by the user. By so doing, the PTF enable users reuse and personalize existing trust models to suit their requirements without having to reprogram those models
Antecedents of trust across foci: a comparative study of Turkey and China
Instead of importing Western models of interpersonal trust, we adopted a qualitative approach to understand trust relationships from indigenous cultures' perspectives. We examined trust relationships directed at different foci in the organization (supervisor, peer, and subordinate) in two different countries, Turkey and China. Semi-structured interviews were conducted with 30 Turkish and 30 Chinese employees working for a variety of large-scale organizations located in Istanbul, Turkey and Shenzhen, China. We report the content analysis of trust-building critical incidents narrated by the respondents. While the general antecedents of Ability, Benevolence, and Integrity were found to exist in both countries, Benevolence, with its culture-specific manifestations, played a very important role in trust-building across multiple foci in both countries. We also found that trust relationships in these two contexts tended to go beyond the professional domain, and to involve sharing of personal time, information, and space. Drawing on this evidence, we propose a trust-building process that is more affective in nature and which straddles both work and non-work domains
Designing an Adaptive Web Navigation Interface for Users with Variable Pointing Performance
Many online services and products require users to point and interact with user interface elements. For individuals who experience variable pointing ability due to physical impairments, environmental issues or age, using an input device (e.g., a computer mouse) to select elements on a website can be difficult. Adaptive user interfaces dynamically change their functionality in response to user behavior. They can support individuals with variable pointing abilities by 1) adapting dynamically to make element selection easier when a user is experiencing pointing difficulties, and 2) informing users about these pointing errors. While adaptive interfaces are increasingly prevalent on the Web, little is known about the preferences and expectations of users with variable pointing abilities and how to design systems that dynamically support them given these preferences.
We conducted an investigation with 27 individuals who intermittently experience pointing problems to inform the design of an adaptive interface for web navigation. We used a functional high-fidelity prototype as a probe to gather information about user preferences and expectations. Our participants expected the system to recognize and integrate their preferences for how pointing tasks were carried out, preferred to receive information about system functionality and wanted to be in control of the interaction. We used findings from the study to inform the design of an adaptive Web navigation interface, PINATA that tracks user pointing performance over time and provides dynamic notifications and assistance tailored to their specifications. Our work contributes to a better understanding of users' preferences and expectations of the design of an adaptive pointing system
Liquid FM: Recommending Music through Viscous Democracy
Most modern recommendation systems use the approach of collaborative
filtering: users that are believed to behave alike are used to produce
recommendations. In this work we describe an application (Liquid FM) taking a
completely different approach. Liquid FM is a music recommendation system that
makes the user responsible for the recommended items. Suggestions are the
result of a voting scheme, employing the idea of viscous democracy. Liquid FM
can also be thought of as the first testbed for this voting system. In this
paper we outline the design and architecture of the application, both from the
theoretical and from the implementation viewpoints
Implementing the Leader Development That Counts
Effective leader development is too often the first casualty of high demands placed on leaders, from corporate America to the U.S. military. A comparison of these entities’ common leader development programs and workforce feedback reveals insufficient strategies and competing priorities. Organizations succumbing to these obstacles unknowingly find themselves trapped in adverse cycles of leadership development, perpetuating undernourished talent and mediocre performance. This problem will not fix itself. Organizations must refocus efforts to understand and implement a leader driven, interpersonally focused, and culturally ingrained brand of leader development to maximize available talent in crafting their envisioned organization
Privacy in the Genomic Era
Genome sequencing technology has advanced at a rapid pace and it is now
possible to generate highly-detailed genotypes inexpensively. The collection
and analysis of such data has the potential to support various applications,
including personalized medical services. While the benefits of the genomics
revolution are trumpeted by the biomedical community, the increased
availability of such data has major implications for personal privacy; notably
because the genome has certain essential features, which include (but are not
limited to) (i) an association with traits and certain diseases, (ii)
identification capability (e.g., forensics), and (iii) revelation of family
relationships. Moreover, direct-to-consumer DNA testing increases the
likelihood that genome data will be made available in less regulated
environments, such as the Internet and for-profit companies. The problem of
genome data privacy thus resides at the crossroads of computer science,
medicine, and public policy. While the computer scientists have addressed data
privacy for various data types, there has been less attention dedicated to
genomic data. Thus, the goal of this paper is to provide a systematization of
knowledge for the computer science community. In doing so, we address some of
the (sometimes erroneous) beliefs of this field and we report on a survey we
conducted about genome data privacy with biomedical specialists. Then, after
characterizing the genome privacy problem, we review the state-of-the-art
regarding privacy attacks on genomic data and strategies for mitigating such
attacks, as well as contextualizing these attacks from the perspective of
medicine and public policy. This paper concludes with an enumeration of the
challenges for genome data privacy and presents a framework to systematize the
analysis of threats and the design of countermeasures as the field moves
forward
- …