11 Hits in 4.4 sec

Proposal of a Novel Bug Bounty Implementation Using Gamification [article]

Jamie O'Hare, Lynsay A. Shepherd
2020 arXiv   pre-print
This paper proposes a novel bug bounty process aiming to alleviate resource demands and mitigate inherent issues.  ...  Despite significant popularity, the bug bounty process has remained broadly unchanged since its inception, with limited implementation of gamification aspects.  ...  Section 3 outlines the proposal of a novel bug bounty program utilising gamification, followed by a discussion of challenges and limitations in Section 4.  ... 
arXiv:2009.10158v1 fatcat:2yqgatj5mbampgiin6rug437t4

Software Engineering Applications Enabled by Blockchain Technology: A Systematic Mapping Study

Selina Demi, Ricardo Colomo-Palacios, Mary Sánchez-Gordón
2021 Applied Sciences  
The novel, yet disruptive blockchain technology has witnessed growing attention, due to its intrinsic potential.  ...  We also found out that smart contracts can enable the automation of a variety of software engineering activities that usually require human reasoning, such as the acceptance phase, payments to software  ...  [47] adopted blockchain technology to address issues in software testing using bug bounties, such as the lack of transparency regarding the price information for bug bounties, and the difficulty in  ... 
doi:10.3390/app11072960 fatcat:r2wlufbqb5grbd7q2qbi7yijwu

BrainQuest: The use of motivational design theories to create a cognitive training game supporting hot executive function

Stuart Iain Gray, Judy Robertson, Andrew Manches, Gnanathusharan Rajendran
2018 International Journal of Human-Computer Studies  
BrainQuest: The use of motivational design theories to create a cognitive training game supporting hot executive function.  ...  Full terms of use are available: Vitae Stuart Iain Gray Bio Dr Stuart Gray is a Research Associate at the University of Bristol.  ...  With their cooperation, the project was a true pleasure to undertake. This work was carried out on a PhD scholarship from Heriot Watt University and the University of Edinburgh.  ... 
doi:10.1016/j.ijhcs.2018.08.004 fatcat:vhn2k3ofxjei3bg6alaigj4ryi

The Crowd in Requirements Engineering: The Landscape and Challenges

Eduard C. Groen, Norbert Seyff, Raian Ali, Fabiano Dalpiaz, Joerg Doerr, Emitza Guzman, Mahmood Hosseini, Jordi Marco, Marc Oriol, Anna Perini, Melanie Stade
2017 IEEE Software  
Engaging a large number of users in requirements engineering (RE) has always been a challenge with traditional RE methods. 1 This is especially true when RE should involve a large number of software product  ...  , the crowd is an undefined group of people. 10 But for CrowdRE, the crowd is in most cases a large group of current or potential users of a software product who interact among themselves or with representatives  ...  The motivation of crowd members is usually driven by extrinsic motivators such as pay or the prospect of winning a bounty.  ... 
doi:10.1109/ms.2017.33 fatcat:lmdm3xdea5gnzius2vqbm6usza

Framework, Tools and Good Practices for Cybersecurity Curricula

Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, Rocco De Nicola
2021 IEEE Access  
Finally, we provide a practical tool that implements the framework and helps education and training providers design new study programs and analyze existing ones by considering the requirements of cybersecurity  ...  First, we analyze the content of 89 existing study programs worldwide, collect recommendations of renowned institutions within and outside the EU, and provide a comprehensive survey accompanied by a dynamic  ...  Another new trend in training is the use of ''bug bounty'' programs, where cybersecurity trainees are motivated to find security vulnerabilities in existing software/hardware and thus improve their skills  ... 
doi:10.1109/access.2021.3093952 fatcat:jiuzcvfz7fgzfb7k67xnmt2ehm

Crowdsourced Data Management: Industry and Academic Perspectives

Adam Marcus, Aditya Parameswaran
2015 Foundations and Trends in Databases  
Through the book, we hope to simultaneously introduce academics to real problems that practitioners encounter every day, and provide a survey of the state of the art for practitioners to incorporate into  ...  Through our surveys, we also highlight the fact that crowdpowered data processing is a large and growing field.  ...  Novel Worker and User Interfaces We now describe a collection of novel interfaces considered by the HCI community to get useful input from workers. • Bounding-box interfaces.  ... 
doi:10.1561/1900000044 fatcat:rva7dinutnbnlj2hvm4j2hmhge

The Role of Mobile Technology in Tourism: Patents, Articles, News, and Mobile Tour App Reviews

Dongwook Kim, Sungbum Kim
2017 Sustainability  
Patents are viewed as implementations of technical ideology that can be consolidated in a technology map for a holistic overview of a field [38, 39] .  ...  Furthermore, patents emphasize the technological aspect, and the rights and novelty of a technology. Therefore, the y are not appropriate for use in deducing how a technology is used by a user.  ...  Acknowledgments: This paper was supported by Kumoh National Institute of Technology. Author Contributions: Sungbum Kim designed the overall framework of the research, and drafted the manuscript.  ... 
doi:10.3390/su9112082 fatcat:2qjofp7skrdf7i37decv7nrraq

Social aspects of collaboration in online software communities [article]

BN Bogdan Vasilescu, MGJ Mark Van Den Brand, A Alexander Serebrenik
The heavy tail of the distribution of AW (a) suggests a more refined analysis.  ...  Specifically, based on their AW (a) values we apply equal-frequency binning and split the authors into two groups: AW < 14 and AW ≥ 14. Figure 2 .14 displays the breakdown of authors after binning.  ...  is gamification [74] (i.e., the use of game elements in a non-game context in order to engage users).  ... 
doi:10.6100/ir780923 fatcat:tjbewr4emrhglefl5wf645ilb4

: Raising Cybersecurity Awareness by Hook or by Crook

For security testing, we present a novel attacker model targeting security scanners.  ...  In particular, we focus on two important aspects, i.e., (i) using security testing to show the lack of a correct mindset in the wild, and (ii) develop new and effective security training techniques.  ...  ., an official bug bounty program or a security officer to contact). Kind regards We sent the email through official channels, e.g., contact mail or form, when available.  ... 
doi:10.15167/valenza-andrea_phd2021-03-25 fatcat:clfvmb5l3ffbdgqh3c53daky4q

A synoptic visualization framework for artwork collection data and artist biographies

Florian Windhager
2020 unpublished
While both fields of study have seen a substantial increase of digital research endeavors lately, they arguably require a systematic development effort on multiple levels.  ...  Firstly, a documentation of visualization options is needed to assemble and critically assess available representation techniques.  ...  This will lead to novel contextual visualization strategies, which will be sketched out for future implementations.  ... 
doi:10.25365/thesis.65279 fatcat:dzcezlxcwjenfdx2n63nyset5m

Ubiquitäre Systeme (Seminar) und Mobile Computing (Proseminar) WS 2013/14. Mobile und Verteilte Systeme. Ubiquitous Computing. Teil X

Martin Alexander [Hrsg.] Neumann, Anja [Hrsg.] Bachmann, Matthias [Hrsg.] Berning, Markus [Hrsg.] Scholz, Yong [Hrsg.] Ding, Matthias [Hrsg.] Budde
This reputation is also be used to create bounties where users can set a certain amount of his own reputation on a question of him.  ...  I will describe the structure of the system and then i will go into details about the used algorithms. The solution proposed in this paper is a novel Time of Flight based localization technique.  ...  As status is a general and very important gamication element it's implemented in both versions of the mobile application. Access: Access diers in the two versions.  ... 
doi:10.5445/ir/1000040034 fatcat:ajdmignirbejxcg4cp47qr4xg4