2 research outputs found

    Collaborative design of software applications: the role of users

    Get PDF
    Abstract Drawing on a 1-year application design, implementation and evaluation experience, this paper examines how engaging users in the early design phases of a software application is tightly bound to the success of that application in use. Through the comparison between two different approaches to collaborative application design (namely, user-centered vs participatory), we reveal how sensitivity to the role that users may play during that collaborative practice rebounds to a good level of user satisfaction during the evaluation process. Our paper also contributes to conversations and reflections on the differences between those two design approaches, while providing evidences that the participatory approach may better sensitize designers to issues of users' satisfaction. We finally offer our study as a resource and a methodology for recognizing and understanding the role of active users during a process of development of a software application

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis
    corecore