Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
351. Pilling, Franziska Louise; Akmal, Haider Ali; Coulton, Paul; Lindley, Joseph Galen: The Process of Gaining an AI Legibility Mark. In: CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pilling_process_2020,
title = {The Process of Gaining an AI Legibility Mark},
author = {Franziska Louise Pilling and Haider Ali Akmal and Paul Coulton and Joseph Galen Lindley},
url = {https://doi.org/10.1145%2F3334480.3381820},
doi = {10.1145/3334480.3381820},
booktitle = {CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Researchers and designers working in industrial sectors seeking to incorporate Artificial Intelligence (AI) technology, will be aware of the emerging International Organisation for AI Legibility (IOAIL). IOAIL was established to overcome the eruption of obscure AI technology. One of the primary goals of IOAIL is the development of a proficient certification body providing knowledge to users regarding the AI technology they are being exposed to. To this end IOAIL produced a system of standardised icons for attaching to products and systems to indicate both the presence of AI and to increase the legibility of that AI's attributes. Whilst the process of certification is voluntary it is becoming a mark of trust, enhancing the usability and acceptability of AI-infused products through improved legibility. In this paper we present our experience of seeking certification for a locally implemented AI security system, highlighting the issues generated for those seeking to adopt such certification.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
352. Akmal, Haider Ali; Coulton, Paul: The Divination of Things by Things. In: CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-akmal_divination_2020,
title = {The Divination of Things by Things},
author = {Haider Ali Akmal and Paul Coulton},
url = {https://doi.org/10.1145%2F3334480.3381823},
doi = {10.1145/3334480.3381823},
booktitle = {CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {As humans our view of the world is predominantly restricted to our own experience and are largely oblivious to the alternate perspective of reality experienced by the objects that cohabit our spaces even though such objects are often integral components of our lives. This paper considers the growing phenomenon whereby non-human objects such as cutlery and appliances are having what might be considered human-like experiences through integration of advanced computational programming. By examining the services provided by Madame Bitsy's Fantastic Future Forecasting and Fortune Telling Emporium for the Internet of Living Things, which is a fully autonomous online fortune telling service for Internet of Things enabled objects and services, we attempt to illuminate what it means to be a digitally connected object.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
353. Seymour, William; Binns, Reuben Daniel; Slovák, Petr; Kleek, Max Goodwin Van; Shadbolt, Nigel R.: Strangers in the Room. In: DIS '20: Proceedings of the 2020 ACM Designing Interactive Systems Conference, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-seymour_strangers_2020,
title = {Strangers in the Room},
author = {William Seymour and Reuben Daniel Binns and Petr Slov\'{a}k and Max Goodwin Van Kleek and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3357236.3395501},
doi = {10.1145/3357236.3395501},
booktitle = {DIS '20: Proceedings of the 2020 ACM Designing Interactive Systems Conference},
publisher = {ACM},
abstract = {The increasingly widespread use of 'smart' devices has raised multifarious ethical concerns regarding their use in domestic spaces. Previous work examining such ethical dimensions has typically either involved empirical studies of concerns raised by specific devices and use contexts, or alternatively expounded on abstract concepts like autonomy, privacy or trust in relation to 'smart homes' in general. This paper attempts to bridge these approaches by asking what features of smart devices users consider as rendering them 'smart' and how these relate to ethical concerns. Through a multimethod investigation including surveys with smart device users (n=120) and semi-structured interviews (n=15), we identify and describe eight types of smartness and explore how they engender a variety of ethical concerns including privacy, autonomy, and disruption of the social order. We argue that this middle ground, between concerns arising from particular devices and more abstract ethical concepts, can better anticipate potential ethical concerns regarding smart devices.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
354. Ekambaranathan, Anirudh; Zhao, Jun; Kleek, Max Goodwin Van: "Money makes the world go around": Identifying Barriers to Better Privacy in Children's Apps From Developers' Perspectives. In: CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-ekambaranathan_money_2021,
title = {"Money makes the world go around": Identifying Barriers to Better Privacy in Children's Apps From Developers' Perspectives},
author = {Anirudh Ekambaranathan and Jun Zhao and Max Goodwin Van Kleek},
url = {https://doi.org/10.1145%2F3411764.3445599},
doi = {10.1145/3411764.3445599},
booktitle = {CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {The industry for children's apps is thriving at the cost of children's privacy: these apps routinely disclose children's data to multiple data trackers and ad networks. As children spend increasing time online, such exposure accumulates to long-term privacy risks. In this paper, we used a mixed-methods approach to investigate why this is happening and how developers might change their practices. We base our analysis against 5 leading data protection frameworks that set out requirements and recommendations for data collection in children's apps. To understand developers' perspectives and constraints, we conducted 134 surveys and 20 semi-structured interviews with popular Android children's app developers. Our analysis revealed that developers largely respect children's best interests; however, they have to make compromises due to limited monetisation options, perceived harmlessness of certain third-party libraries, and lack of availability of design guidelines. We identified concrete approaches and directions for future research to help overcome these barriers.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
355. Smart, Paul R.; O'Hara, Kieron; Cox, Adrian; Hall, Wendy: Cyber-Physical Systems and Social Machines. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-smart_cyber_2020,
title = {Cyber-Physical Systems and Social Machines},
author = {Paul R. Smart and Kieron O'Hara and Adrian Cox and Wendy Hall},
url = {https://doi.org/10.2139%2Fssrn.3705252},
doi = {10.2139/ssrn.3705252},
publisher = {Elsevier BV},
abstract = {Social machines have long been a topic of theoretical and empirical interest for the Web and Internet science community. Although there is no widespread agreement as to the precise meaning of the term "social machine," the term has served as something of a conceptual anchor for research efforts into a number of online systems, such as Facebook, Wikipedia, and Galaxy Zoo. Recently, the term "social machine" has surfaced in a somewhat different disciplinary context. In particular, it has been applied to systems that are commonly referred to as cyber-physical systems. Here, the residual ambiguity surrounding the meaning of the term "social machine" has stymied efforts to understand the nature of the relationship between social machines and cyber-physical systems. This situation is further complicated by the absence of a precise conceptual understanding of cyber-physical systems. The present paper outlines an approach to understanding both social machines and cyber-physical systems that is intended to resolve this impasse. Inspired by recent work in the philosophy of science, we present a mechanistic (or neo-mechanical) account of social machines that draws attention to the features of socio-technical mechanisms. Such an account, we suggest, is able to accommodate the intuitions of Web scientists regarding the nature of social machines, while simultaneously illuminating the nature of the relationship between social machines and cyber-physical systems. As an added bonus, the account speaks to the interdisciplinary concerns of the Web science community by highlighting a link between the science of social machines and mechanism-based approaches in the social sciences.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
356. Akmal, Haider Ali; Coulton, Paul: The Internet of Things Game: Revealing the Complexity of the IoT. In: Proceedings of DiGRA 2020, 0000. (Type: Inproceedings | Abstract | BibTeX) @inproceedings{proc-in-akmal_internet_2020,
title = {The Internet of Things Game: Revealing the Complexity of the IoT},
author = {Haider Ali Akmal and Paul Coulton},
booktitle = {Proceedings of DiGRA 2020},
abstract = {The Internet of Things (IoT) is a phenomenon wherein everyday objects are capable of interacting together through the Internet; producing complex interdependencies between human and non-human actants. However, much of this complexity is not legible to users of IoT and can produce concerns relating to areas such as privacy and security, when the independent-but-interdependent motivations and perspectives of the actants are incongruent. To address this issue this paper presents The Internet of Things Board Game, which has been designed such that its procedural rhetoric makes legible these independent-but-interdependent relationships; and reveal how they manifest in the management of our security and privacy within IoT. The results of play-testing the game through multiple iterations highlight the valuable contribution games can play in revealing the ever-increasing complexity of relationships between the digital and the physical, and the human and non-human.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
357. Kleek, Max Goodwin Van: Super-reflective Data: Speculative Imaginings of a World Where Data Works For People. In: Signs, Signals & Signifers Speculative Designs for Emergent Personal Data Trails at CHI 2020, 0000. (Type: Inproceedings | Abstract | Links | BibTeX) @inproceedings{proc-in-kleek_super_2020,
title = {Super-reflective Data: Speculative Imaginings of a World Where Data Works For People},
author = {Max Goodwin Van Kleek},
url = {https://www.emergentdatatrails.com/},
booktitle = {Signs, Signals \& Signifers Speculative Designs for Emergent Personal Data Trails at CHI 2020},
abstract = {It's the year 2020, and every space and place on- and off-line has been augmented with digital things that observe, record, transmit, and compute, for the purposes of recording endless data traces of what is happening in the world. Individually, these things (and the invisible services the power them) have reached considerable sophistication in their ability to analyse and dissect such observations, turning streams of audio and video into informative parcels-data fragments containing spoken utterances, activity data, and moment-to-moment minutiae about the world and its inhabitants. For this workshop, we propose two hypothetical mini scenarios different from our current digital world. In the former, instead of hoarding it, data controllers turn captured data over to those who need it as quickly as possible, working together to combine, validate, and refine it for maximum usefulness. This simultaneously addresses the data fragmentation and privacy problem, by handing over long-term data governance to those that value it the most. In the latter, we discuss ethical dilemmas using the long-term use of such rich data and its tendency to cause people to relentlessly optimise.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
358. Smart, Paul R.; Hall, Wendy; Boniface, Michael J.: Extended Computation: Wide Computationalism in Reverse. In: 13th ACM Web Science Conference 2021, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-smart_extended_2021,
title = {Extended Computation: Wide Computationalism in Reverse},
author = {Paul R. Smart and Wendy Hall and Michael J. Boniface},
doi = {10.1145/3462741.3466810},
booktitle = {13th ACM Web Science Conference 2021},
publisher = {ACM},
abstract = {Arguments for extended cognition and the extended mind are typically directed at human-centred forms of cognitive extension\textemdashforms of cognitive extension in which the cognitive/mental states and processes of a given human individual are subject to a form of extended or wide realization. The same is true of debates and discussions pertaining to the possibility of Web-extended minds and Internet-based forms of cognitive extension. In this case, the focus of attention concerns the extent to which the informational and technological elements of the online environment form part of the machinery of the (individual) human mind. In this paper, we direct attention to a somewhat different form of cognitive extension. In particular, we suggest that the Web allows human individuals to be incorporated into the computational/cognitive routines of online systems. These forms of computational/cognitive extension highlight the potential of the Web and Internet to support bidirectional forms of computational/cognitive incorporation. The analysis of such bidirectional forms of incorporation broadens the scope of philosophical debates in this area, with potentially important implications for our understanding of the foundational notions of extended cognition and the extended mind.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
359. Smart, Paul R.; O'Hara, Kieron; Hall, Wendy: Applying mechanical philosophy to web science: The case of social machines. In: vol. 11, no. 3, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-smart_applying_2021,
title = {Applying mechanical philosophy to web science: The case of social machines},
author = {Paul R. Smart and Kieron O'Hara and Wendy Hall},
doi = {10.1007/s13194-021-00388-z},
volume = {11},
number = {3},
publisher = {Springer Science and Business Media LLC},
abstract = {Social machines are a prominent focus of attention for those who work in the field of Web and Internet science. Although a number of online systems have been described as social machines (examples include the likes of Facebook, Twitter, Wikipedia, Reddit, and Galaxy Zoo), there is, as yet, little consensus as to the precise meaning of the term "social machine." This presents a problem for the scientific study of social machines, especially when it comes to the provision of a theoretical framework that directs, informs, and explicates the scientific and engineering activities of the social machine community. The present paper outlines an approach to understanding social machines that draws on recent work in the philosophy of science, especially work in so-called mechanical philosophy. This is what might be called a mechanistic view of social machines. According to this view, social machines are systems whose phenomena (i.e., events, states, and processes) are explained via an appeal to (online) socio-technical mechanisms. We show how this account is able to accommodate a number of existing attempts to define the social machine concept, thereby yielding an important opportunity for theoretical integration.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
360. Smart, Paul R.: Predicting Me: The Route to Digital Immortality?. In: The Mind-Technology Problem, pp. 185–207, Springer International Publishing, 0000. (Type: Incollection | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-smart_predicting_2021,
title = {Predicting Me: The Route to Digital Immortality?},
author = {Paul R. Smart},
doi = {10.1007/978-3-030-72644-7_9},
booktitle = {The Mind-Technology Problem},
pages = {185--207},
publisher = {Springer International Publishing},
abstract = {An emerging consensus in cognitive science views the biological brain as a hierarchically-organized predictive processing system that relies on generative models to predict the structure of sensory information. Such a view resonates with a body of work in machine learning that has explored the problem-solving capabilities of hierarchically-organized, multi-layer (i.e., deep) neural networks, many of which acquire and deploy generative models of their training data. The present chapter explores the extent to which the ostensible convergence on a common neurocomputational architecture (centred on predictive processing schemes, hierarchical organization, and generative models) might provide inroads into the problem of digital immortality. In contrast to approaches that seek to recapitulate the physical structure of the human brain, the present chapter advocates an approach that is rooted in the use of machine learning algorithms. The claim is that a future form of deep learning system could be used to acquire generative models of a given individual or (alternatively) the sensory data that is processed by the brain of a given individual during the course of their biological life. The differences between these two forms of digital immortality are explored, as are some of the options for digital resurrection.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
361. Smart, Paul R.: Shedding Light on the Extended Mind: HoloLens, Holograms, and Internet-Extended Knowledge. In: vol. 12, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-smart_shedding_2021,
title = {Shedding Light on the Extended Mind: HoloLens, Holograms, and Internet-Extended Knowledge},
author = {Paul R. Smart},
doi = {10.3389/fpsyg.2021.675184},
volume = {12},
publisher = {Frontiers Media SA},
abstract = {The application of extended mind theory to the Internet and Web yields the possibility of Internet-extended knowledge\textemdasha form of extended knowledge that arises as a result of an individual's interactions with the online environment. The present paper seeks to advance our understanding of Internet-extended knowledge by describing the functionality of a real-world application, called the HoloArt app. In part, the goal of the paper is illustrative: it is intended to show how recent advances in mixed reality, cloud-computing, and machine intelligence might be combined so as to yield a putative case of Internet-extended knowledge. Beyond this, however, the paper is intended to support the philosophical effort to understand the notions of extended knowledge and the extended mind. In particular, the HoloArt app raises questions about the universality of some of the criteria that have been used to evaluate putative cases of cognitive extension. The upshot is a better appreciation of the way in which claims about extended knowledge and the extended mind might be affected by a consideration of technologically-advanced resources.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
362. Radanliev, Petar; Roure, David Charles De; Walton, Rob; Kleek, Max Goodwin Van; Montalvo, Rafael Mantilla; Maddox, La'Treall; Santos, Omar; Burnap, Peter; Anthi, Eirini: Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge. In: vol. 2, no. 11, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_artificial_2020a,
title = {Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge},
author = {Petar Radanliev and David Charles De Roure and Rob Walton and Max Goodwin Van Kleek and Rafael Mantilla Montalvo and La'Treall Maddox and Omar Santos and Peter Burnap and Eirini Anthi},
doi = {10.1007/s42452-020-03559-4},
volume = {2},
number = {11},
publisher = {Springer Science and Business Media LLC},
abstract = {We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in connected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide ranging and creative methodologies for cyber analytics and explore the risks of deliberately influencing or disrupting behaviours to socio-technical systems. This resulted in the modelling of the connections and interdependencies between a system's edge components to both external and internal services and systems. We focus on proposals for models, infrastructures and frameworks of IoT systems found in both business reports and technical papers. We analyse this juxtaposition of related systems and technologies, in academic and industry papers published in the past 10 years. Then, we report the results of a qualitative empirical study that correlates the academic literature with key technological advances in connected devices. The work is based on grouping future and present techniques and presenting the results through a new conceptual framework. With the application of social science's grounded theory, the framework details a new process for a prototype of AI-enabled dynamic cyber risk analytics at the edge.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
363. Radanliev, Petar; Roure, David Charles De; Nicolescu, Razvan; Huth, Michael; Santos, Omar: Artificial Intelligence and the Internet of Things in Industry 4.0. In: vol. 3, no. 3, pp. 329–338, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_artificial_2021,
title = {Artificial Intelligence and the Internet of Things in Industry 4.0},
author = {Petar Radanliev and David Charles De Roure and Razvan Nicolescu and Michael Huth and Omar Santos},
doi = {10.1007/s42486-021-00057-3},
volume = {3},
number = {3},
pages = {329--338},
publisher = {Springer Science and Business Media LLC},
abstract = {This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results of a qualitative empirical study that correlates world leading Industry 4.0 frameworks. Second, the study establishes the present and future techniques for increased automation in cyber-physical systems. We present the cybersecurity requirements as they are changing with the integration of artificial intelligence and internet of things in cyber-physical systems. The grounded theory methodology is applied for analysis and modelling the connections and interdependencies between edge components and automation in cyber-physical systems. In addition, the hierarchical cascading methodology is used in combination with the taxonomic classifications, to design a new integrated framework for future cyber-physical systems. The study looks at increased automation in cyber-physical systems from a technical and social level.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
364. Radanliev, Petar; Roure, David Charles De; Nicolescu, Razvan; Huth, Michael; Santos, Omar: Digital twins: artificial intelligence and the IoT cyber-physical systems in Industry 4.0. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_digital_2021,
title = {Digital twins: artificial intelligence and the IoT cyber-physical systems in Industry 4.0},
author = {Petar Radanliev and David Charles De Roure and Razvan Nicolescu and Michael Huth and Omar Santos},
doi = {10.1007/s41315-021-00180-5},
publisher = {Springer Science and Business Media LLC},
abstract = {This paper presents a summary of mechanisms for the evolution of artificial intelligence in 'internet of things' networks. Firstly, the paper investigates how the use of new technologies in industrial systems improves organisational resilience supporting both a technical and human level. Secondly, the paper reports empirical results that correlate academic literature with Industry 4.0 interdependencies between edge components to both external and internal services and systems. The novelty of the paper is a new approach for creating a virtual representation operating as a real-time digital counterpart of a physical object or process (i.e., digital twin) outlined in a conceptual diagram. The methodology applied in this paper resembled a grounded theory analysis of complex interconnected and coupled systems. By connecting the human-computer interactions in different information knowledge management systems, this paper presents a summary of mechanisms for the evolution of artificial intelligence in internet of things networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
365. Radanliev, Petar; Roure, David Charles De; Ani, Uchenna P. Daniel; Carvalho, Graça: The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures. In: vol. 11, no. 5, pp. 1083–1091, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_ethics_2021,
title = {The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures},
author = {Petar Radanliev and David Charles De Roure and Uchenna P. Daniel Ani and Gra\c{c}a Carvalho},
doi = {10.1007/s12553-021-00565-3},
volume = {11},
number = {5},
pages = {1083--1091},
publisher = {Springer Science and Business Media LLC},
abstract = {This article addresses the topic of shared responsibilities in supply chains, with a specific focus on the application of the Internet of Things (IoT) in e-health environments, and Industry 4.0 issues\textemdashconcerning data security, privacy, reliability and management, data mining and knowledge exchange as well as health prevention. In this article, we critically review methodologies and guidelines that have been proposed to approach these ethical aspects in digital supply chain settings. The emerging framework presents new findings on how digital technologies affect vaccine shared supply chain systems. Through epistemological analysis, the article derives new insights for transparency and accountability of supply chain cyber risk from Internet of Things systems. This research devises a framework for ethical awareness, assessment, transparency and accountability of the emerging cyber risk from integrating IoT technologies on shared Covid-19 healthcare supply chain infrastructure.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
366. Radanliev, Petar; Roure, David Charles De; Burnap, Peter; Santos, Omar: Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. In: vol. 15, no. 2, pp. 381–411, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_epistemological_2021,
title = {Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things},
author = {Petar Radanliev and David Charles De Roure and Peter Burnap and Omar Santos},
doi = {10.1007/s12626-021-00086-5},
volume = {15},
number = {2},
pages = {381--411},
publisher = {Springer Science and Business Media LLC},
abstract = {The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems\textemdashwhich begin to resemble artificial intelligence\textemdashand can be used for a quantitative self-assessment of IoT cyber risk posture.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
367. Ani, Uchenna P. Daniel; Watson, Jeremy Daniel McKendrick; Carr, Madeline; Cook, Al; Nurse, Jason R. C.: A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints. In: pp. 154851292095349, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ani_review_2020,
title = {A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints},
author = {Uchenna P. Daniel Ani and Jeremy Daniel McKendrick Watson and Madeline Carr and Al Cook and Jason R. C. Nurse},
doi = {10.1177/1548512920953499},
pages = {154851292095349},
publisher = {SAGE Publications},
abstract = {Simulation can provide a useful means to understand issues linked to industrial network operations. For transparent, collaborative, cost-effective solutions development, and to attract the broadest interest base, simulation is critical and open source suggested, because it costs less to access, install, and use. This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of open source simulators. Several open source simulators span applications in communications and wireless sensor networks, industrial control systems, and the Industrial Internet of Things. Some drivers for their use span are as follows: supported license types; programming languages; operating systems platforms; user interface types; documentation and communication types; citations; code commits; and number of contributors. Research in these simulators is built around performance and optimization relative to flexibility, scalability, mobility, and active user support. No single simulator addresses all these conceivable characteristics. In addition to modeling contexts that match real-world scenarios and issues, an effective open source simulator needs to demonstrate credibility, which can be gained partly through actively engaging experts from interdisciplinary teams along with user contributions integrated under tight editorial controls. Government-led policies and regulations are also necessary to support their wider awareness and more productive use for real-world purposes.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
368. Simkute, Auste; Luger, Ewa A.; Evans, Michael; Jones, Rhianne: Experts in the Shadow of Algorithmic Systems. In: Companion Publication of the 2020 ACM Designing Interactive Systems Conference, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-simkute_experts_2020,
title = {Experts in the Shadow of Algorithmic Systems},
author = {Auste Simkute and Ewa A. Luger and Michael Evans and Rhianne Jones},
doi = {10.1145/3393914.3395862},
booktitle = {Companion Publication of the 2020 ACM Designing Interactive Systems Conference},
publisher = {ACM},
abstract = {Algorithms support decision-making in various contexts, often diminishing human agency in the process. Without meaningful human input, use of predictive systems can result in costly errors, leaving users unable to evaluate accuracy. Intelligibility is one design criterion that may ensure users remain in the decision-making loop. However, guidance is currently diffuse and focused on the lay user, ignoring the role of expertise. We propose a cognitive psychology-based framework that segments decision-making space by users' expertise, risk-environment and motivation. We illustrate this by focusing on expertise, exploring how we might inform usable intelligibility in interface design, enhancing user agency in the decision-making process.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
369. Satyanarayanan, Mahadev; Davies, Nigel; Taft, Nina: Balancing privacy and serendipity in cyberspace. In: Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-satyanarayanan_balancing_2022,
title = {Balancing privacy and serendipity in cyberspace},
author = {Mahadev Satyanarayanan and Nigel Davies and Nina Taft},
doi = {10.1145/3508396.3512873},
booktitle = {Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications},
publisher = {ACM},
abstract = {Unplanned encounters or casual collisions between colleagues have long been recognized as catalysts for creativity and innovation. The absence of such encounters has been a negative side effect of COVID-enforced remote work. However, there have also been positive side effects such as less time lost to commutes, lower carbon footprints, and improved work-life balance. This vision paper explores how serendipity for remote workers can be created by leveraging IoT technologies, edge computing, high-resolution video, network protocols for live interaction, and video/audio denaturing. We reflect on the privacy issues that technology-mediated serendipity raises and sketch a path towards honoring diverse privacy preferences.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
370. Andrada, Gloria; Clowes, Robert W.; Smart, Paul R.: Varieties of transparency: exploring agency within AI systems. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-andrada_varieties_2022,
title = {Varieties of transparency: exploring agency within AI systems},
author = {Gloria Andrada and Robert W. Clowes and Paul R. Smart},
doi = {10.1007/s00146-021-01326-6},
publisher = {Springer Science and Business Media LLC},
abstract = {AI systems play an increasingly important role in shaping and regulating the lives of millions of human beings across the world. Calls for greater transparency from such systems have been widespread. However, there is considerable ambiguity concerning what "transparency" actually means, and therefore, what greater transparency might entail. While, according to some debates, transparency requires seeing through the artefact or device, widespread calls for transparency imply seeing into different aspects of AI systems. These two notions are in apparent tension with each other, and they are present in two lively but largely disconnected debates. In this paper, we aim to further analyse what these calls for transparency entail, and in so doing, clarify the sorts of transparency that we should want from AI systems. We do so by offering a taxonomy that classifies different notions of transparency. After a careful exploration of the different varieties of transparency, we show how this taxonomy can help us to navigate various domains of human-technology interactions, and more usefully discuss the relationship between technological transparency and human agency. We conclude by arguing that all of these different notions of transparency should be taken into account when designing more ethically adequate AI systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
371. Radanliev, Petar: Artificial Intelligence, Machine Learning and Real-time Probabilistic Data for Cyber Risk (Super) -forecasting: Red Teaming the Connected World (RETCON). In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_artificial_2020b,
title = {Artificial Intelligence, Machine Learning and Real-time Probabilistic Data for Cyber Risk (Super) -forecasting: Red Teaming the Connected World (RETCON)},
author = {Petar Radanliev},
doi = {10.20944/preprints202003.0217.v1},
publisher = {MDPI AG},
abstract = {This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
372. Goodell, Geoffrey; Al-Nakib, Hazem Danny: The Development of Central Bank Digital Currency in China: An Analysis. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-goodell_development_2021,
title = {The Development of Central Bank Digital Currency in China: An Analysis},
author = {Geoffrey Goodell and Hazem Danny Al-Nakib},
doi = {10.2139/ssrn.3906358},
publisher = {Elsevier BV},
abstract = {The People's Bank of China (PBOC) has launched an ambitious project to develop a digital currency for use in domestic, retail transactions, and is, by far, the most advanced globally in this regard. In addition to involving a diverse set of stakeholders, the PBOC established a set of fundamental principles, including privacy, inclusiveness, and conservatism, and has articulated its progress in a public document translated into English. We maintain that although both its first principles and its conclusions drawn from the research conducted by the PBOC from 2014 to date are broadly reasonable and appropriate, the PBOC has also missed some important considerations and entertained some questionable assumptions, which many central banks around the world have also done. In this analysis, we consider the strengths and weaknesses of the digital currency proposition articulated by the PBOC as it exists today, and we propose one fundamental and specific change for the PBOC and other central banks around the world: The architecture must accommodate privacy-preserving, non-custodial wallets. With this change and a related set of minor adjustments, China has an opportunity to lead the world in the implementation of a central bank digital currency (CBDC) solution that protects the authority of the central bank to implement monetary policy, preserves the role of public-sector and private-sector banking institutions, promotes the efficiency of retail transactions and businesses, satisfies regulatory objectives, and safeguards the human rights of retail consumers, including their privacy and their right to participate in the economy. We hope that the PBOC, and other central banks around the world, will have the resolve and strength of purpose to implement our proposed change and carry on with implementing a CBDC architecture that serves the interests of its users.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
373. Goodell, Geoffrey; Toliver, Dann R.; Al-Nakib, Hazem Danny: A Scalable Architecture for Electronic Payments. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-goodell_scalable_2021,
title = {A Scalable Architecture for Electronic Payments},
author = {Geoffrey Goodell and Dann R. Toliver and Hazem Danny Al-Nakib},
doi = {10.2139/ssrn.3951988},
publisher = {Elsevier BV},
abstract = {We present a scalable architecture for electronic payments via central bank digital currency and offer a solution to the perceived conflict between robust regulatory oversight and consumer affordances such as privacy and control. Our architecture combines existing work in payment systems and digital currency with a new approach to digital asset design for managing unforgeable, stateful, and oblivious assets without relying on either a central authority or a monolithic consensus system. Regulated financial institutions have a role in every transaction, and the consumer affordances are achieved through the use of non-custodial wallets that unlink the sender from the recipient in the transaction channel. This approach is fully compatible with the existing two-tiered banking system and can complement and extend the roles of existing money services businesses and asset custodians.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
374. Mikusz, Mateusz; Noulas, Anastasios K.; Davies, Nigel; Clinch, Sarah; Friday, Adrian: Next Generation Physical Analytics for Digital Signage. In: WPA '16: Proceedings of the 3rd International on Workshop on Physical Analytics, ACM Press, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mikusz_next_2016,
title = {Next Generation Physical Analytics for Digital Signage},
author = {Mateusz Mikusz and Anastasios K. Noulas and Nigel Davies and Sarah Clinch and Adrian Friday},
url = {https://doi.org/10.1145%2F2935651.2935658},
doi = {10.1145/2935651.2935658},
booktitle = {WPA '16: Proceedings of the 3rd International on Workshop on Physical Analytics},
publisher = {ACM Press},
abstract = {Traditional digital signage analytics are based on a display-centric view of the world, reporting data on the content shown augmented with frequency of views and possibly classification of the audience demographics. What these systems are unable to provide, are insights into viewers' overall experience of content. This is problematic if we want to understand where, for example, to place content in a network of physically distributed digital signs to optimise content exposure. In this paper we propose a new approach that combines mobility simulations with comprehensive signage analytics data to provide viewer-centric physical analytics. Our approach enables us to ask questions of the analytics from the viewer's perspective for the first time, including estimating the exposure of different user groups to specific content across the entire signage network. We describe a proof of concept implementation that demonstrates the feasibility of our approach, and provide an overview of potential applications and analytics reports.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
375. Mikusz, Mateusz; Bates, Oliver; Clinch, Sarah; Davies, Nigel; Friday, Adrian; Noulas, Anastasios K.: Poster: Understanding Mobile User Interactions with the IoT. In: MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, ACM Press, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mikusz_poster_2016,
title = {Poster: Understanding Mobile User Interactions with the IoT},
author = {Mateusz Mikusz and Oliver Bates and Sarah Clinch and Nigel Davies and Adrian Friday and Anastasios K. Noulas},
url = {https://doi.org/10.1145%2F2938559.2938607},
doi = {10.1145/2938559.2938607},
booktitle = {MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion},
publisher = {ACM Press},
abstract = {The increasing reach of the Internet of Things (IoT) is leading to a world rich in sensors [3] that can be used to support physical analytics -- analogous to web analytics but targeted at user interactions with physical devices in the real-world (e.g. [2]). In contrast to web analytics, physical analytics systems typically only provide data relating to sensors and objects without consideration of individual users. This is mainly a consequence of an inability to track individual mobile user interactions across multiple physical objects (or across sessions of interaction with a single object) using, for example, an analogue of a web cookie. Indeed, such a "physical analytics cookie" could raise significant privacy concerns.
However, in many cases a more "human-centric" approach to analytics would enable us to provide new and interesting insights into interactions between mobile users and the physical world [1]. In our work we endeavour to leverage synthetic user traces of human mobility, and data from real IoT systems, to provide such insights.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
However, in many cases a more "human-centric" approach to analytics would enable us to provide new and interesting insights into interactions between mobile users and the physical world [1]. In our work we endeavour to leverage synthetic user traces of human mobility, and data from real IoT systems, to provide such insights.376. Ani, Uchenna P. Daniel; Watson, Jeremy Daniel McKendrick: What Makes an Industrial Control System Security Testbed Credible and Acceptable? Towards a Design Consideration Framework. In: Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SCITEPRESS - Science and Technology Publications, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-ani_what_2021,
title = {What Makes an Industrial Control System Security Testbed Credible and Acceptable? Towards a Design Consideration Framework},
author = {Uchenna P. Daniel Ani and Jeremy Daniel McKendrick Watson},
doi = {10.5220/0010170301810190},
booktitle = {Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, Technologies and Applications},
publisher = {SCITEPRESS - Science and Technology Publications},
abstract = {The convergence of Industrial Control System (ICS) with Information Technologies (IT) coupled with the resulting and widely publicized cyber security incidents have made ICS security and resilience issues of critical concern to operators and governments. The inability to apply traditional IT security practice to ICSs further complicates the challenges of effectively securing critical industrial systems. To investigate these challenges without impacting upon live system operations, testbeds are being widely used as viable options to explore, develop and assess security risks and controls. However, how an ICS testbed is designed, and its attributes, can directly impact not only on its viability but also its credibility and acceptance for use as a whole. Through a systematic review and analysis of ICS security testbed design factors, a novel outline conceptual mapping of design factors for building credibility and acceptance is proposed. These design considerations include: design objec tives, implementation approach, architectural component coverage, core operational characteristics, and evaluation approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
377. Lindley, Joseph Galen; Coulton, Paul; Sturdee, Miriam: Implications for Adoption. In: CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lindley_implications_2017,
title = {Implications for Adoption},
author = {Joseph Galen Lindley and Paul Coulton and Miriam Sturdee},
url = {https://doi.org/10.1145%2F3025453.3025742},
doi = {10.1145/3025453.3025742},
booktitle = {CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {In this paper we explore the motivations for, and practicalities of, incorporating "implications for adoption" into HCI research practice. Implications for adoption are speculations which may be used in research projects to scrutinize and explore the implications and requirements associated with a technology's potential adoption in the future. There is a rich tradition within the HCI community of implementing, demonstrating, and testing new interactions or technologies by building prototypes. User-centered design methods help us to develop prototypes to and move toward designs that are validated, efficient, and rewarding to use. However, these studies rarely shift their temporal focus to consider, in any significant detail, what it would mean for a technology to exist beyond its prototypical implementation, in other words how these prototypes might ultimately be adopted. Given the CHI community's increasing interest in technology-related human and social effects, the lack of attention paid to adoption represents a significant and relevant gap in current practices. It is this gap that the paper addresses and in doing so offers three contributions: (1) exploring and unpacking different notions of adoption from varying disciplinary perspectives; (2) discussing why considering adoption is relevant and useful, specifically in HCI research; (3) discussing methods for addressing this need, specifically design fiction, and understanding how utilizing these methods may provide researchers with means to better understand the myriad of nuanced, situated, and technologically-mediated relationships that innovative designs facilitate.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
378. Chen, Yexiang; Lakshminarayana, Subhash; Maple, Carsten; Poor, H. Vincent: A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations. In: vol. 9, pp. 109–120, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-chen_meta_2022,
title = {A Meta-Learning Approach to the Optimal Power Flow Problem Under Topology Reconfigurations},
author = {Yexiang Chen and Subhash Lakshminarayana and Carsten Maple and H. Vincent Poor},
doi = {10.1109/oajpe.2022.3140314},
volume = {9},
pages = {109--120},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Recently there has been a surge of interest in adopting deep neural networks (DNNs) for solving the optimal power flow (OPF) problem in power systems. Computing optimal generation dispatch decisions using a trained DNN takes significantly less time when compared to conventional optimization solvers. However, a major drawback of existing work is that the machine learning models are trained for a specific system topology. Hence, the DNN predictions are only useful as long as the system topology remains unchanged. Changes to the system topology (initiated by the system operator) would require retraining the DNN, which incurs significant training overhead and requires an extensive amount of training data (corresponding to the new system topology). To overcome this drawback, we propose a DNN-based OPF predictor that is trained using a meta-learning (MTL) approach. The key idea behind this approach is to find a common initialization vector that enables fast training for any system topology. The developed OPF-predictor is validated through simulations using benchmark IEEE bus systems. The results show that the MTL approach achieves significant training speed-ups and requires only a few gradient steps with a few data samples to achieve high OPF prediction accuracy and outperforms other pretraining techniques.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
379. Tinati, Ramine; Madaan, Aastha; Hall, Wendy: The Role of Crowdsourcing in the Emerging Internet-Of-Things. In: WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion, ACM Press, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tinati_role_2017,
title = {The Role of Crowdsourcing in the Emerging Internet-Of-Things},
author = {Ramine Tinati and Aastha Madaan and Wendy Hall},
url = {https://doi.org/10.1145%2F3041021.3051693},
doi = {10.1145/3041021.3051693},
booktitle = {WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion},
publisher = {ACM Press},
abstract = {In this position paper we wish to propose and discuss several open research questions associated with the IoT. In particular, we wish to consider how crowdsourcing can be used as a scalable, reliable, and sustainable approach to support various computationally difficult and ambiguous tasks recognised in IoT research. We illustrate our work by examining a number of use cases related to healthcare and smart cities, and finally consider the future development of the IoT eco-system with respect to the socio-technical philosophy and implementation of the Web Observatory.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
380. Lakshminarayana, Subhash; Ospina, Juan; Konstantinou, Charalambos: Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions. In: pp. 1–1, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lakshminarayana_load_2022,
title = {Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions},
author = {Subhash Lakshminarayana and Juan Ospina and Charalambos Konstantinou},
doi = {10.1109/oajpe.2022.3155973},
pages = {1--1},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The COVID-19 pandemic has impacted our society by forcing shutdowns and shifting the way people interacted worldwide. In relation to the impacts on the electric grid, it created a significant decrease in energy demands across the globe. Recent studies have shown that the low demand conditions caused by COVID-19 lockdowns combined with large renewable generation have resulted in extremely low-inertia grid conditions. In this work, we examine how an attacker could exploit these scenarios to cause unsafe grid operating conditions by executing load-altering attacks (LAAs) targeted at compromising hundreds of thousands of IoT-connected high-wattage loads in low-inertia power systems. Our study focuses on analyzing the impact of the COVID-19 mitigation measures on U.S. regional transmission operators (RTOs), formulating a plausible and realistic least-effort LAA targeted at transmission systems with low-inertia conditions, and evaluating the probability of these large-scale LAAs. Theoretical and simulation results are presented based on the WSCC 9-bus and IEEE 118-bus test systems. Results demonstrate how adversaries could provoke major frequency disturbances by targeting vulnerable load buses in low-inertia systems and offer insights into how the temporal fluctuations of renewable energy sources, considering generation scheduling, impact the grid's vulnerability to LAAs.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
381. Klaine, Paulo Valente; Zhang, Lei; Imran, Muhammad Ali: An Implementation of a Blockchain-based Data Marketplace using Geth. In: 2021 3rd Conference on Blockchain Research &$mathsemicolon$ Applications for Innovative Networks and Services (BRAINS), IEEE, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-klaine_implementation_2021,
title = {An Implementation of a Blockchain-based Data Marketplace using Geth},
author = {Paulo Valente Klaine and Lei Zhang and Muhammad Ali Imran},
doi = {10.1109/brains52497.2021.9569838},
booktitle = {2021 3rd Conference on Blockchain Research \&$mathsemicolon$ Applications for Innovative Networks and Services (BRAINS)},
publisher = {IEEE},
abstract = {Nowadays data is one of the most important assets that can be obtained, as many applications rely on data to generate useful services. However, a very few number of companies control, in a centralized manner, a large portion of data. That, combined with inefficiencies in centralized storage and recent data leak scandals, highlights the need for new ways in which data is shared and consumed, in which privacy and access control is guaranteed by design. Based on that, in this paper we present an implementation of a blockchain-based data marketplace utilizing the Go Ethereum (Geth) library. The implementation consists of an IoT node powered by a raspberry pi zero W, which is utilized to collect data from the environment and store it in an InterPlanetary File System (IPFS) external server, a web page that displays the marketplace, and a private blockchain that records transactions. Regarding the private blockchain, three smart contracts are developed in order to: 1) record information about the data in the marketplace; 2) record transactions that occur between users; 3) allow sellers to white/blacklist buyers' access to the data. This implementation shows that a decentralized blockchain-based marketplace is feasible and scalable, and we hope it can serve as an early model for future frameworks.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
382. Alotaibi, Norah; Islam, Md Shafiqul; Marky, Karola; Khamis, Mohamed: Advanced Techniques for Preventing Thermal Imaging Attacks. In: 27th International Conference on Intelligent User Interfaces, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-alotaibi_advanced_2022,
title = {Advanced Techniques for Preventing Thermal Imaging Attacks},
author = {Norah Alotaibi and Md Shafiqul Islam and Karola Marky and Mohamed Khamis},
doi = {10.1145/3490100.3516472},
booktitle = {27th International Conference on Intelligent User Interfaces},
publisher = {ACM},
abstract = {Thermal cameras can be used to detect user input on interfaces, such as touchscreens, keyboards, and PIN pads, by recording the heat traces left by the users' fingers after interaction (e.g., typing a message or entering a PIN) and using them to reconstruct the input. While previous work mitigated the thermal attacks by complicating input or distorting heat traces, our research is the first to propose preventing thermal attack using deep learning (DL) techniques to prevent malicious use of thermal cameras. Our DL models detect interfaces in the thermal camera feed and then obfuscate heat traces on them. Our preliminary findings show that the proposed framework can detect interfaces and eliminate authentication information from thermal images. At the same time, our methods still reveal if an interface has been interacted with. Thus, our approach improves security without impacting the utility of the thermal camera.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
383. Bonner, Jolie; O'Hagan, Joseph; Mathis, Florian; Ferguson, Jamie; Khamis, Mohamed: Using Personal Data to Support Authentication: User Attitudes and Suitability. In: 20th International Conference on Mobile and Ubiquitous Multimedia, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bonner_using_2021,
title = {Using Personal Data to Support Authentication: User Attitudes and Suitability},
author = {Jolie Bonner and Joseph O'Hagan and Florian Mathis and Jamie Ferguson and Mohamed Khamis},
doi = {10.1145/3490632.3490644},
booktitle = {20th International Conference on Mobile and Ubiquitous Multimedia},
publisher = {ACM},
abstract = {Dynamic personal data based on a user's activity, such as recent visited physical locations, browsing history, and call logs, update frequently, making it a promising token for user authentication. However, it is not clear how users perceive this use of personal data and which data types are most suitable for authentication. To investigate this, we conducted an online survey with N=100 participants. For 10 personal data types we asked participants about their comfort with this data for authentication, its perceived security, its impact on behaviour, who has access to it, how frequently it updates, and how memorable they perceive it to be. We found that participants were generally uncomfortable with personal data being used for authentication and, knowing their personal data is used, they may intentionally change their behaviour due to privacy concerns. We discuss the benefits and drawbacks of using personal data as a source of dynamic tokens to complement authentication and conclude with three learned lessons.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
384. Lindley, Joseph Galen; Coulton, Paul; Cooper, Rachel: Not on Demand: Internet of Things Enabled Energy Temporality. In: DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lindley_not_2017,
title = {Not on Demand: Internet of Things Enabled Energy Temporality},
author = {Joseph Galen Lindley and Paul Coulton and Rachel Cooper},
url = {https://doi.org/10.1145%2F3064857.3079112},
doi = {10.1145/3064857.3079112},
booktitle = {DIS '17 Companion: Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems},
publisher = {ACM},
abstract = {Over a century ago alternating current (AC) triumphed over direct current (DC) in the "war of the currents" and ever since AC has been ubiquitous. Increasingly devices operating internally use DC power, hence inefficient conversions from AC to DC are necessarily common. Conversely, domestic photovoltaic (PV) panels produce DC current which must be inverted to AC to integrate with existing wiring, appliances, and/or be exported the power grid. By using batteries, specifically designed DC devices, and the Internet of Things, our infrastructure may be redesigned to improve efficiency. In this provocation, we use design fiction to describe how such a system could be implemented and to open a discussion about the broader implications of such a technological shift on user experience design and interaction design.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
385. Seymour, William; Kleek, Max Goodwin Van: Exploring Interactions Between Trust, Anthropomorphism, and Relationship Development in Voice Assistants. In: vol. 5, no. CSCW2, pp. 1–16, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-seymour_exploring_2021,
title = {Exploring Interactions Between Trust, Anthropomorphism, and Relationship Development in Voice Assistants},
author = {William Seymour and Max Goodwin Van Kleek},
doi = {10.1145/3479515},
volume = {5},
number = {CSCW2},
pages = {1--16},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Modern conversational agents such as Alexa and Google Assistant represent significant progress in speech recognition, natural language processing, and speech synthesis. But as these agents have grown more realistic, concerns have been raised over how their social nature might unconsciously shape our interactions with them. Through a survey of 500 voice assistant users, we explore whether users' relationships with their voice assistants can be quantified using the same metrics as social, interpersonal relationships; as well as if this correlates with how much they trust their devices and the extent to which they anthropomorphise them. Using Knapp's staircase model of human relationships, we find that not only can human-device interactions be modelled in this way, but also that relationship development with voice assistants correlates with increased trust and anthropomorphism.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
386. Davies, Nigel; Clinch, Sarah; Mikusz, Mateusz; Bates, Oliver; Turner, Helen; Friday, Adrian: Better off: when should pervasive displays be powered down?. In: PerDis '17: Proceedings of the 6th ACM International Symposium on Pervasive Displays, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-davies_better_2017,
title = {Better off: when should pervasive displays be powered down?},
author = {Nigel Davies and Sarah Clinch and Mateusz Mikusz and Oliver Bates and Helen Turner and Adrian Friday},
url = {https://doi.org/10.1145%2F3078810.3078821},
doi = {10.1145/3078810.3078821},
booktitle = {PerDis '17: Proceedings of the 6th ACM International Symposium on Pervasive Displays},
publisher = {ACM},
abstract = {Digital displays are a ubiquitous feature of our public spaces - both ever present, and "always on". In this paper we use a combination of literature survey, experimental work, and stakeholder interviews to consider if maximising the amount of time such displays are powered on is truly advantageous. We challenge existing practice by considering arguments from the perspectives of multiple stakeholders (viewers, passers-by, content creators and signage owners), and identify multiple facets for consideration including levels of attention, cognitive load, impact on social interactions, energy and financial costs, advertising revenue, perceptions of failure and the pressures of creating valuable content.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
387. Olma, Matthaios; Tauheed, Farhan; Heinis, Thomas; Ailamaki, Anastasia: BLOCK: Efficient Execution of Spatial Range Queries in Main-Memory. In: SSDBM '17: Proceedings of the 29th International Conference on Scientific and Statistical Database Management, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-olma_block_2017,
title = {BLOCK: Efficient Execution of Spatial Range Queries in Main-Memory},
author = {Matthaios Olma and Farhan Tauheed and Thomas Heinis and Anastasia Ailamaki},
url = {https://doi.org/10.1145%2F3085504.3085519},
doi = {10.1145/3085504.3085519},
booktitle = {SSDBM '17: Proceedings of the 29th International Conference on Scientific and Statistical Database Management},
publisher = {ACM},
abstract = {The execution of spatial range queries is at the core of many applications, particularly in the simulation sciences but also in many other domains. Although main memory in desktop and supercomputers alike has grown considerably in recent years, most spatial indexes supporting the efficient execution of range queries are still only optimized for disk access (minimizing disk page reads). Recent research has primarily focused on the optimization of known disk-based approaches for memory (through cache alignment etc.) but has not fundamentally revisited index structures for memory.
In this paper we develop BLOCK, a novel approach to execute range queries on spatial data featuring volumetric objects in main memory. Our approach is built on the key insight that in-memory approaches need to be optimized to reduce the number of intersection tests (between objects and query but also in the index structure). Our experimental results show that BLOCK outperforms known in-memory indexes as well as in-memory implementations of disk-based spatial indexes up to a factor of 7. The experiments show that it is more scalable than competing approaches as the data sets become denser.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper we develop BLOCK, a novel approach to execute range queries on spatial data featuring volumetric objects in main memory. Our approach is built on the key insight that in-memory approaches need to be optimized to reduce the number of intersection tests (between objects and query but also in the index structure). Our experimental results show that BLOCK outperforms known in-memory indexes as well as in-memory implementations of disk-based spatial indexes up to a factor of 7. The experiments show that it is more scalable than competing approaches as the data sets become denser.388. Kollnig, Konrad; Datta, Siddhartha; Kleek, Max Goodwin Van: I Want My App That Way: Reclaiming Sovereignty Over Personal Devices. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kollnig_i_2021,
title = {I Want My App That Way: Reclaiming Sovereignty Over Personal Devices},
author = {Konrad Kollnig and Siddhartha Datta and Max Goodwin Van Kleek},
doi = {10.1145/3411763.3451632},
booktitle = {Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Dark patterns in mobile apps take advantage of cognitive biases of end-users and can have detrimental effects on people's lives. Despite growing research in identifying remedies for dark patterns and established solutions for desktop browsers, there exists no established methodology to reduce dark patterns in mobile apps. Our work introduces GreaseDroid, a community-driven app modification framework enabling non-expert users to disable dark patterns in apps selectively.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
389. Agrawal, Nitin; Binns, Reuben Daniel; Kleek, Max Goodwin Van; Laine, Kim; Shadbolt, Nigel R.: Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-agrawal_exploring_2021,
title = {Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation},
author = {Nitin Agrawal and Reuben Daniel Binns and Max Goodwin Van Kleek and Kim Laine and Nigel R. Shadbolt},
doi = {10.1145/3411764.3445677},
booktitle = {Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Homomorphic encryption, secure multi-party computation, and differential privacy are part of an emerging class of Privacy Enhancing Technologies which share a common promise: to preserve privacy whilst also obtaining the benefits of computational analysis. Due to their relative novelty, complexity, and opacity, these technologies provoke a variety of novel questions for design and governance. We interviewed researchers, developers, industry leaders, policymakers, and designers involved in their deployment to explore motivations, expectations, perceived opportunities and barriers to adoption. This provided insight into several pertinent challenges facing the adoption of these technologies, including: how they might make a nebulous concept like privacy computationally tractable; how to make them more usable by developers; and how they could be explained and made accountable to stakeholders and wider society. We conclude with implications for the development, deployment, and responsible governance of these privacy-preserving computation techniques.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
390. Ekambaranathan, Anirudh; Zhao, Jun; Kleek, Max Goodwin Van: Understanding Value and Design Choices Made by Android Family App Developers. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-ekambaranathan_understanding_2020,
title = {Understanding Value and Design Choices Made by Android Family App Developers},
author = {Anirudh Ekambaranathan and Jun Zhao and Max Goodwin Van Kleek},
doi = {10.1145/3334480.3383064},
booktitle = {Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {The rapidly expanding family mobile app market provides a great opportunity for children's education and development. However, recent research has revealed a prevalence of persuasive designs and tracking of children's data in these apps, which may harm children's online privacy and self-regulation development. We conducted 20 interviews with Android family app developers to understand their design practices. We used the lens of Value Sensitive Design to identify developer's values and how they translate them into design choices. Our findings show that though developer values are generally aligned with the best interest of users, they often must make compromises due to market pressure, lack of monetisation options, and the use of biased design guidelines. Our findings show a need for centralised actionable guidelines and important directions for HCI research to support both end-users' and developers' values.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
391. Bradbury, Matthew; Jhumka, Arshad; Watson, Tim: Trust assessment in 32 KiB of RAM. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bradbury_trust_2021,
title = {Trust assessment in 32 KiB of RAM},
author = {Matthew Bradbury and Arshad Jhumka and Tim Watson},
doi = {10.1145/3412841.3441898},
booktitle = {Proceedings of the 36th Annual ACM Symposium on Applied Computing},
publisher = {ACM},
abstract = {There is an increasing demand for Internet of Things (IoT) systems comprised of resource-constrained sensor and actuator nodes executing increasingly complex applications, possibly simultaneously. IoT devices will not be able to execute computationally expensive tasks and will require more powerful computing nodes, called edge nodes, for such execution, in a process called computation offloading. When multiple powerful nodes are available, a selection problem arises: which edge node should a task be submitted to? This problem is even more acute when the system is subjected to attacks, such as DoS, or network perturbations such as system overload. In this paper, we present a trust model-based system architecture for computation offloading, based on behavioural evidence. The system architecture provides confidentiality, authentication and non-repudiation of messages in required scenarios and will operate within the resource constraints of embedded IoT nodes. We demonstrate the viability of the architecture with an example deployment of Beta Reputation System trust model on real hardware.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
392. Bradbury, Matthew; Jhumka, Arshad; Watson, Tim; Flores, Denys; Burton, Jonathan; Butler, Matthew: Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. In: vol. 18, no. 2, pp. 1–41, 0000, ISSN: 1550-4859. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bradbury_threat_2022,
title = {Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things},
author = {Matthew Bradbury and Arshad Jhumka and Tim Watson and Denys Flores and Jonathan Burton and Matthew Butler},
doi = {10.1145/3510424},
issn = {1550-4859},
volume = {18},
number = {2},
pages = {1--41},
publisher = {Association for Computing Machinery (ACM)},
abstract = {There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrained devices executing increasingly complex applications. Due to these resource constraints, IoT devices will not be able to execute expensive tasks. One solution is to offload expensive tasks to resource-rich edge nodes, which requires a framework that facilitates the selection of suitable edge nodes to perform task offloading. Therefore, in this article, we present a novel trust-model-driven system architecture, based on behavioral evidence, that is suitable for resource-constrained IoT devices and supports computation offloading. We demonstrate the viability of the proposed architecture with an example deployment of the Beta Reputation System trust model on real hardware to capture node behaviors. The open environment of edge-based IoT networks means that threats against edge nodes can lead to deviation from expected behavior. Hence, we perform a threat modeling to identify such threats. The proposed system architecture includes threat handling mechanisms that provide security properties such as confidentiality, authentication, and non-repudiation of messages in required scenarios and operate within the resource constraints. We evaluate the efficacy of the threat handling mechanisms and identify future work for the standards used.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
393. Milton, Richard; Buyuklieva, Boyana; Hay, Duncan; Hudson-Smith, Andrew; Gray, Steven: Talking to GNOMEs: Exploring Privacy and Trust Around Internet of Things Devices in a Public Space. In: CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-milton_talking_2018,
title = {Talking to GNOMEs: Exploring Privacy and Trust Around Internet of Things Devices in a Public Space},
author = {Richard Milton and Boyana Buyuklieva and Duncan Hay and Andrew Hudson-Smith and Steven Gray},
url = {https://doi.org/10.1145%2F3170427.3188481},
doi = {10.1145/3170427.3188481},
booktitle = {CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Privacy issues can be difficult for end-users to understand and are therefore a key concern for information-sharing systems. This paper describes a deployment of fifteen Bluetooth-beacon-enabled 'creatures' spread across London's Queen Elizabeth Olympic Park, which initiate conversations on mobile phones in their vicinity via push notifications. Playing on the common assumption that neutral public settings promote anonymity, users' willingness to converse with personified chatbots is used as a proxy for understanding their inclination to share personal and potentially disclosing information. Each creature is linked to a conversational agent that asks for users' memories and their responses are then shared with other creatures in the network. This paper presents the design of an interactive device used to test users' awareness of how their information propagates to others.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
394. Alghamdi, Ibrahim; Anagnostopoulos, Christos; Pezaros, Dimitrios P.: Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach. In: vol. 117, pp. 462–479, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-alghamdi_data_2021,
title = {Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach},
author = {Ibrahim Alghamdi and Christos Anagnostopoulos and Dimitrios P. Pezaros},
doi = {10.1016/j.future.2020.12.017},
volume = {117},
pages = {462--479},
publisher = {Elsevier BV},
abstract = {An important use case of the Mobile Edge Computing (MEC) paradigm is task and data offloading. Computational offloading is beneficial for a wide variety of mobile applications on different platforms including autonomous vehicles and smartphones. With the envision deployment of MEC servers along the roads and while mobile nodes are moving and having certain tasks (or data) to be offloaded to edge servers, choosing an appropriate time and an ideally suited MEC server to guarantee the Quality of Service (QoS) is challenging. We tackle the data quality-aware offloading sequential decision making problem by adopting the principles of Optimal Stopping Theory (OST) to minimize the expected processing time. A variety of OST stochastic models and their applications to the offloading decision making problem are investigated and assessed. A performance evaluation is provided using simulation approach and real world data sets together with the assessment of baseline deterministic and stochastic offloading models. The results show that the proposed OST models can significantly minimize the expected processing time for analytics task execution and can be implemented in the mobile nodes efficiently.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
395. Llorens-Carrodeguas, Alejandro; Sagkriotis, Stefanos G.; Cervelló-Pastor, Cristina; Pezaros, Dimitrios P.: An Energy-Friendly Scheduler for Edge Computing Systems. In: vol. 21, no. 21, pp. 7151, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-llorens-carrodeguas_energy_2021,
title = {An Energy-Friendly Scheduler for Edge Computing Systems},
author = {Alejandro Llorens-Carrodeguas and Stefanos G. Sagkriotis and Cristina Cervell\'{o}-Pastor and Dimitrios P. Pezaros},
doi = {10.3390/s21217151},
volume = {21},
number = {21},
pages = {7151},
publisher = {MDPI AG},
abstract = {The deployment of modern applications, like massive Internet of Things (IoT), poses a combination of challenges that service providers need to overcome: high availability of the offered services, low latency, and low energy consumption. To overcome these challenges, service providers have been placing computing infrastructure close to the end users, at the edge of the network. In this vein, single board computer (SBC) clusters have gained attention due to their low cost, low energy consumption, and easy programmability. A subset of IoT applications requires the deployment of battery-powered SBCs, or clusters thereof. More recently, the deployment of services on SBC clusters has been automated through the use of containers. The management of these containers is performed by orchestration platforms, like Kubernetes. However, orchestration platforms do not consider remaining energy levels for their placement decisions and therefore are not optimized for energy-constrained environments. In this study, we propose a scheduler that is optimised for energy-constrained SBC clusters and operates within Kubernetes. Through comparison with the available schedulers we achieved 23% fewer event rejections, 83% less deadline violations, and approximately a 59% reduction of the consumed energy throughout the cluster.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
396. Xia, Le; Sun, Yao; Swash, Rafiq; Mohjazi, Lina; Zhang, Lei; Imran, Muhammad Ali: Smart and Secure CAV Networks Empowered by AI-Enabled Blockchain: The Next Frontier for Intelligent Safe Driving Assessment. In: vol. 36, no. 1, pp. 197–204, 0000, ISSN: 1558-156X. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-xia_smart_2022,
title = {Smart and Secure CAV Networks Empowered by AI-Enabled Blockchain: The Next Frontier for Intelligent Safe Driving Assessment},
author = {Le Xia and Yao Sun and Rafiq Swash and Lina Mohjazi and Lei Zhang and Muhammad Ali Imran},
doi = {10.1109/mnet.101.2100387},
issn = {1558-156X},
volume = {36},
number = {1},
pages = {197--204},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Securing safe driving for connected and autonomous vehicles (CAVs) continues to be a widespread concern, despite various sophisticated functions delivered by artificial intelligence for in-vehicle devices. Diverse malicious network attacks are ubiquitous, along with the worldwide implementation of the Internet of Vehicles, which exposes a range of reliability and privacy threats for managing data in CAV networks. Combined with the fact that the capability of existing CAVs in handling intensive computation tasks is limited, this implies a need for designing an efficient assessment system to guarantee autonomous driving safety without compromising data security. In this article we propose a novel framework, namely Blockchain-enabled intElligent Safe-driving assessmenT (BEST), which offers a smart and reliable approach for conducting safe driving supervision while protecting vehicular information. Specifically, a promising solution that exploits a long short-term memory model is introduced to assess the safety level of the moving CAVs. Then we investigate how a distributed blockchain obtains adequate trustworthiness and robustness for CAV data by adopting a byzantine fault tolerance-based delegated proof-of-stake consensus mechanism. Simulation results demonstrate that our presented BEST gains better data credibility with a higher prediction accuracy for vehicular safety assessment when compared with existing schemes. Finally, we discuss several open challenges that need to be addressed in future CAV networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
397. Cormode, Graham; Kulkarni, Tejas; Srivastava, Divesh: Marginal Release Under Local Differential Privacy. In: SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-cormode_marginal_2018,
title = {Marginal Release Under Local Differential Privacy},
author = {Graham Cormode and Tejas Kulkarni and Divesh Srivastava},
url = {https://doi.org/10.1145%2F3183713.3196906},
doi = {10.1145/3183713.3196906},
booktitle = {SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data},
publisher = {ACM},
abstract = {Many analysis and machine learning tasks require the availability of marginal statistics on multidimensional datasets while providing strong privacy guarantees for the data subjects. Applications for these statistics range from finding correlations in the data to fitting sophisticated prediction models. In this paper, we provide a set of algorithms for materializing marginal statistics under the strong model of local differential privacy. We prove the first tight theoretical bounds on the accuracy of marginals compiled under each approach, perform empirical evaluation to confirm these bounds, and evaluate them for tasks such as modeling and correlation testing. Our results show that releasing information based on (local) Fourier transformations of the input is preferable to alternatives based directly on (local) marginals.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
398. Cormode, Graham; Jha, Somesh K.; Kulkarni, Tejas; Li, Ninghui; Srivastava, Divesh; Wang, Tianhao: Privacy at Scale. In: SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-cormode_privacy_2018,
title = {Privacy at Scale},
author = {Graham Cormode and Somesh K. Jha and Tejas Kulkarni and Ninghui Li and Divesh Srivastava and Tianhao Wang},
url = {https://doi.org/10.1145%2F3183713.3197390},
doi = {10.1145/3183713.3197390},
booktitle = {SIGMOD '18: Proceedings of the 2018 International Conference on Management of Data},
publisher = {ACM},
abstract = {Local differential privacy (LDP), where users randomly perturb their inputs to provide plausible deniability of their data without the need for a trusted party, has been adopted recently by several major technology organizations, including Google, Apple and Microsoft. This tutorial aims to introduce the key technical underpinnings of these deployed systems, to survey current research that addresses related problems within the LDP model, and to identify relevant open problems and research directions for the community.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
399. Mikusz, Mateusz; Clinch, Sarah; Shaw, Peter; Davies, Nigel; Nurmi, Petteri: Using Pervasive Displays to Aid Student Recall -Reflections on a Campus-Wide Trial. In: PerDis '18: Proceedings of the 7th ACM International Symposium on Pervasive Displays, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mikusz_using_2018,
title = {Using Pervasive Displays to Aid Student Recall -Reflections on a Campus-Wide Trial},
author = {Mateusz Mikusz and Sarah Clinch and Peter Shaw and Nigel Davies and Petteri Nurmi},
url = {https://doi.org/10.1145%2F3205873.3205882},
doi = {10.1145/3205873.3205882},
booktitle = {PerDis '18: Proceedings of the 7th ACM International Symposium on Pervasive Displays},
publisher = {ACM},
abstract = {University campuses are rapidly transitioning to environments that are rich in technology designed to support learning throughout the day and in diverse forms. Traditional lectures and seminars are supplemented with rich WiFi coverage, integrated learning environments, video lectures, public display networks and other innovations. Of these diverse technologies, the role and potential of public display networks in higher education is currently least understood. Indeed, most campus displays are merely used as means of information dissemination or as tools to support collaboration.
In this paper, we explore the potential of pervasive display technologies as active contributors to university teaching and learning. We describe a real-world explorative study in which campus displays we used to stimulate student recall of lecture material. Our experiences demonstrate that public displays can be leveraged to provide prompts at opportune moments and invites further research in designing memory prompts to leverage the learning potential of pervasive displays in campus settings. The insights we garnered form a solid foundation and highlight opportunities and challenges in the field.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we explore the potential of pervasive display technologies as active contributors to university teaching and learning. We describe a real-world explorative study in which campus displays we used to stimulate student recall of lecture material. Our experiences demonstrate that public displays can be leveraged to provide prompts at opportune moments and invites further research in designing memory prompts to leverage the learning potential of pervasive displays in campus settings. The insights we garnered form a solid foundation and highlight opportunities and challenges in the field.400. Lyngs, Ulrik; Lukoff, Kai; Slovák, Petr; Binns, Reuben Daniel; Slack, Adam; Inzlicht, Michael; Kleek, Max Goodwin Van; Shadbolt, Nigel R.: Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools. In: CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lyngs_self_2019,
title = {Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools},
author = {Ulrik Lyngs and Kai Lukoff and Petr Slov\'{a}k and Reuben Daniel Binns and Adam Slack and Michael Inzlicht and Max Goodwin Van Kleek and Nigel R. Shadbolt},
url = {https://doi.org/10.1145%2F3290605.3300361},
doi = {10.1145/3290605.3300361},
booktitle = {CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Many people struggle to control their use of digital devices. However, our understanding of the design mechanisms that support user self-control remains limited. In this paper, we make two contributions to HCI research in this space: first, we analyse 367 apps and browser extensions from the Google Play, Chrome Web, and Apple App stores to identify common core design features and intervention strategies afforded by current tools for digital self-control. Second, we adapt and apply an integrative dual systems model of self-regulation as a framework for organising and evaluating the design features found. Our analysis aims to help the design of better tools in two ways: (i) by identifying how, through a well-established model of self-regulation, current tools overlap and differ in how they support self-control; and (ii) by using the model to reveal underexplored cognitive mechanisms that could aid the design of new tools.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}