The paper investigates the role of user bias in online trust systems and develops a methodology for the design of better systems. It delves into the workings of online computational trust systems under user bias and analyses the user behaviour through biases defined by Prospect theory. The results of an empirical study and the analysis are used to propose to the system designers a methodology for user bias identification and mitigation for trust systems based on the subjective logic theory, which reduces complexity and improves the user experience and the system performance.
COBISS.SI-ID: 29835815
Vectorial Boolean bent functions, which possess the maximal nonlinearity and the minimum differential uniformity, contribute to optimum resistance against linear cryptanalysis and differential cryptanalysis for the cryptographic algorithms that adopt them as nonlinear components. The maximum number of these functions is calculated in the article as an important data in designing Boolean based crypto systems that are resisting several types of crypto-analysis.
COBISS.SI-ID: 31065383
The paper describes a structural model on the relation between user's trust in mobile and ad-hoc networks and characteristics of her environment. The model is based on an analysis and empirical evaluation of the mobile phones inbuilt security measures and user attitude and awareness about privacy among the users from several countries. The analysis and evaluation results show that most of the smart phones provide some sort of protection. Key environment factors that influence the attitude and awareness of the users are level of development, accessibility of the modern technology, and the user purchasing power.
COBISS.SI-ID: 28585767
This paper investigates user choices in password selection for recognition-based graphical authentication in online services. Our analysis is based on a total of 302 participants continuously using a graphical authentication system during a 6-week long study. The results show pronounced preference effects for image properties such as colour, shape, and category. The results in the form of graphical password selection guidelines are useful for any online services providers who want to improve security and usability of their graphical authentication solutions.
COBISS.SI-ID: 23192038
This paper presents a mathematical model for decision taking for an investment in the information security technology. The decision-making process is based on a quantitative analysis of the security risks and a digital assets assessment in an organization. The model makes use of a quantitative analysis of different security measures that counteract individual risks by identifying the information system processes in an enterprise and the potential threats. The model comprises the target security levels for all identified core business processes and the probability of a security accident together with the possible loss the organization may suffer. The model allows indepth analysis and computations providing quantitative assessments of different options for investments, which translate into recommendations that facilitate the selection of the best solution and the associated decisionmaking. The model was tested with data from a real business environment.
COBISS.SI-ID: 25578535
The publication identifies the main obstacles in the Future Internet evolution and the problems that have appeared with the enlargement and the complexity of the network. The evolution directions are discussed and four scenarios for development are presented. The scenarios are evaluated and the best model based on the user and service providers needs is selected and its future evolution recommended.
COBISS.SI-ID: 25533991
The paper identifies key factors that affect acceptance of telehealth services among older users. Although telehealth offers an improved approach to providing healthcare services, its adoption by users remains slow. By a rigorous analysis of the results of a survey among 400 users we have found that the level at which the services are perceived as easy to use and manage is the leading acceptance predictor in older users' service acceptance. Also, the intuitiveness of graphical user interfaces and perceived security are key factors determining the success of the initial adoption. The paper also introduces important methodological guidelines for measuring perceptions on a conceptual level of future services that currently do not exist.
COBISS.SI-ID: 23020006
In this paper several necessary and sufficient conditions related to vectorial bent functions given in a multiple trace form are derived. These conditions can be efficiently used for specifying vectorial bent functions given in the particular trace form considered, essentially using the sum of trace monomials with Dillon exponents. The approach based on the use of elementary symmetric polynomials to establish the bentness of binomial trace mappings seems to be an interesting framework for handling the vectorial bent property of these mappings, used in cryptographic algorithms.
COBISS.SI-ID: 1536201924
In line with the expectation confirmation theory the authors have found that the primary reason for the understanding the value of supply chain risk management (SCRM) is in companies’ attitudes. Their main expectation is risk avoidance and not the value generation. In such a case, even “successful” SCRM programmes merely confirm the expectation that they will have a limited impact and the company usually continues to avoid risk while limiting the resources for SCRM. The change is only when the expected benefit of SCRM is not solely risk avoidance but mainly value generation that increased attention can be expected over time.
COBISS.SI-ID: 23090150
This paper presents the results of a study with objectives to identify the common factors influencing the development of broadband communications in Europe with an aim to elaborate their importance and influence. The study was carried out within the European FP6 BReATH project with a goal to determine the key components when deploying broadband access services. The empirical and the analytical study presented in the paper have pointed to more than ten factors that influence the development and the adoption of broadband infrastructure. At the same time, they have revealed that even for Europe no general model with common factors can be applied for all European regions for development of strategic plans and actions. A set of enablers and measures to be selected for strategy development by different environments were suggested.
COBISS.SI-ID: 21336103