Filters








6,734 Hits in 10.1 sec

Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming [chapter]

Rod McCall, Lynne Baillie, Franziska Boehm, Mike Just
2012 Lecture Notes in Computer Science  
The workshop will explore the core challenges associated with the increasing use of serious gaming in particular those systems that seek to persuade users to alter their behavior.  ...  The workshop will focus on three main areas: data privacy, trustworthiness and usability. The workshop particularly welcomes submissions from people who seek to bridge the divide between these topics.  ...  As a result there is a need to explore the data privacy and protection issues that surround serious and persuasive gaming.  ... 
doi:10.1007/978-3-642-33542-6_77 fatcat:3ew2k4laxzhwphmwwabkhi6nh4

ETICA Workshop on Computer Ethics: Exploring Normative Issues [chapter]

Bernd Carsten Stahl, Catherine Flick
2011 IFIP Advances in Information and Communication Technology  
This paper discusses the ethical views of the workshop participants and contrasts them with the findings of the ethical analysis within the ETICA project.  ...  Workshop participants were asked to reflect on the ethical issues they saw as relevant and likely to arise from the technology.  ...  Many of the VR / AR applications are in the area of gaming which raises ethical concerns about the violence that can be found in many such games.  ... 
doi:10.1007/978-3-642-20769-3_6 fatcat:xjb3ileomzbp5j7q2o4gpo4t6e

AAAI-07 Workshop Reports

Sarabjot Singh Anand, Daniel Bahls, Catherina Burghart, Mark H. Burstein, Huajun Chen, John Collins, Thomas G. Dietterich, Jon Doyle, Chris Drummond, William Elazmeh, Christopher W. Geib, Judy Goldsmith (+27 others)
2007 The AI Magazine  
However, as statistical approaches gained in power and popularity, and some kinds of data became more plentiful, machine learning as a field moved away from this kind of learning, which requires strong  ...  In the mid to late 1980s there was a flurry of papers using explanationbased techniques to learn how to perform complex actions by observing (or interpreting descriptions of) human performance.  ...  The workshop was held in conjunction with the finals of the 2007 Trading Agent Competition. Two game scenarios and two challenge events attracted 39 entries.  ... 
doi:10.1609/aimag.v28i4.2071 dblp:journals/aim/AnandBBBCCDDDEGGGHJJJKKLLLLMMMMNNOOPRRRSSWW07 fatcat:kv7si5jmjnekjkr54qlcmoh6rm

Security and Morality: A Tale of User Deceit

L. Jean Camp, Cathleen McGrath, Alla Genkina
2006 Workshop on Models of Trust for the Web  
There has been considerable debate about the apparent irrationality of end users in choosing with whom to share information, with much of the discourse crystallized in research on phishing.  ...  Usability must be more than the interface design, but rather integrate security and privacy into a trust interaction.  ...  The definition of trust used here and the set of methods used to explore trust perfectly coincide and are based in the quantitative, game-theory tradition of experiments in trust in which trust is an enacted  ... 
dblp:conf/mtw/CampMG06 fatcat:rgq7elt22nhh5hje3vpwgel5h4

A preliminary investigation of user incentives to leverage crowdsensing activities

Nicolas Haderer, Romain Rouvoy, Lionel Seinturier
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
While exploiting the wisdom of the crowd provides huge benefits to pervasive applications, one of the key challenges remains to motivate people to contribute to flow of data by sharing some of the capabilities  ...  In this paper, we therefore report on the APISENSE platform, a participative platform that help scientists to collect realistic datasets from a population of voluntary participants.  ...  or on ethical and privacy issues related to the storage of collected traces.  ... 
doi:10.1109/percomw.2013.6529481 dblp:conf/percom/HadererRS13 fatcat:hrvt7owduvbydnxoilxk2gsjli

Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned

Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis
2014 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)  
We describe our experience gained while exploring practical security and privacy problems in a real-world, largescale social network (i.e., Facebook), and summarize our conclusions in a series of "lessons  ...  Gaining the audience's engagement and trust was essential to the success of our user study.  ...  This work was supported in part by the FP7 project SysSec funded by the EU Commission under grant agreement no 257007, and by the MIUR under the FIRB2013 FACE grant.  ... 
doi:10.1109/badgers.2014.9 dblp:conf/badgers/PolakisMZK14 fatcat:mkb4zbvekvbnxgsuxcxa7k7hom

Privacy controls for always-listening devices

Nathan Malkin, Serge Egelman, David Wagner
2019 Proceedings of the New Security Paradigms Workshop  
Though potentially useful, the continuous recording and analysis of speech can pose a serious threat to individuals' privacy.  ...  Intelligent voice assistants (IVAs) and other voice-enabled devices already form an integral component of the Internet of Things and will continue to grow in popularity.  ...  of Security program; and the generosity of Cisco and Mozilla.  ... 
doi:10.1145/3368860.3368867 dblp:conf/nspw/MalkinEW19 fatcat:2tyglap6rnaizononywbmvrsr4

Lifting the Lid: How Prison Writing Workshops Shed Light on the Social Shadow

Erec Toso
2016 Community Literacy Journal  
I offer here a first person narrative reflection on the connections between a writing workshops and raising social awareness of the realities of day-to-day lives of inmates.  ...  Appropriate writing pedagogy, personal challenges to meeting to the workshops, and the need to publish inmate stories inform the essay.  ...  Consider the work of J., an addict, a self-identified ex-member of the Aryan Brotherhood, and one of the more serious members of the workshop: J. grew up in Phoenix, lived on the streets after he dropped  ... 
doi:10.25148/clj.10.2.009263 fatcat:v3z76gjvwzarvp27jxv44tak4i

Using adaptive architecture to support Yoga practices: Social considerations for design

Nils Jager, Stuart Moran, Holger Schnadelbach
2014 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)  
We explore the social considerations of deploying this novel technology, and then examine the different possibilities for interaction.  ...  ExoBuilding is an in-house prototypical example of Adaptive Architecture, which actuates in response to breathing and heartrate of its occupants.  ...  In two meetings and one workshop we explored the possibilities of how to integrate ExoBuilding into the practice of yoga and the practice of teaching yoga.  ... 
doi:10.1109/percomw.2014.6815233 dblp:conf/percom/JagerMS14 fatcat:5eoszhxgnzayvgqfc5qkd6j2jq

Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112)

Pierre Dillenbourg, Armando Fox, Claude Kirchner, John Mitchell, Martin Wirsing, Marc Herbstritt
2014 Dagstuhl Manifestos  
The rapid emergence and adoption of Massive Open Online Courses (MOOCs) has raised new questions and rekindled old debates in higher education.  ...  Eight provocative positions are put forward, in hopes of aiding policymakers, academics, administrators, and learners regarding the potential future of MOOCs in higher education.  ...  Ethical: more research on the ethical use of MOOCs data is needed to understand which kind of information should be accessible to whom, focusing on the privacy issues related to the data produced by the  ... 
doi:10.4230/dagman.4.1.1 dblp:journals/dagstuhl-manifestos/DillenbourgFKMW14 fatcat:p534ryue7nfpdn4u357ioj6isi

Design Challenges for Social Interactions at Factory Floor

Milla Immonen, Paula Alavesa, Vasiliki Mylonopoulou
2019 2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)  
Industry 4.0, describes the transition of labor into more digitized and automated era.  ...  In this paper we present the initial step in recognizing the design challenges for a project developing social gamified eHealth applications to the factory floor.  ...  ACKNOWLEDGMENTS This research is done in a Business Finland funded project Reboot Finland IoT Factory 33/31/2018 supported by Academy of Finland 6Genesis Flagship (318927).  ... 
doi:10.1109/vs-games.2019.8864601 dblp:conf/vsgames/ImmonenAM19 fatcat:7w56cnx75jfnvmt37mioijpiqe

Digital health now and in the future: Findings from a participatory design stakeholder workshop

Deborah Lupton
2017 Digital Health  
provision and efficacy and ensuring ethical management of personal health data.  ...  At the same time, personal data privacy and security need protection.  ...  The topic of the privacy and security of citizens' health and medical information was recognised as important in all groups.  ... 
doi:10.1177/2055207617740018 pmid:29942616 pmcid:PMC6001191 fatcat:zhusjybasrferdcxtz24fu66lm

Skullduggery in peer-to-peer networks and the need for a new cyber-social theory

Donna Champion
2021 International Workshop on Socio-Technical Perspective in IS Development  
, and then create and hold the record of transactions and asset holdings (the ledger).  ...  DL/blockchains are operationalised through the combined actions of complex software algorithms and digitally distributed Peer-to-Peer (P2P) networks which act together to validate data and transactions  ...  the co-constitution between the social and the technical does not imply equality", and they argue for IS research that explores these ethical dimensions.  ... 
dblp:conf/stpis/Champion21 fatcat:n4vnkfo6q5aczklrptqqabjwha

Security and usability

Mohammad Mannan, P. C. van Oorschot
2008 Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07  
We examine some of these requirements as set by major Canadian banks, in terms of security and usability.  ...  Online banking is one of the most sensitive tasks performed by general Internet users.  ...  Acknowledgements We thank anonymous NSPW reviewers for their comments, and NSPW 2007 attendees and members of the Carleton's Digital Security Group for their enthusiastic discussion on this topic.  ... 
doi:10.1145/1600176.1600178 dblp:conf/nspw/MannanO07 fatcat:5h5r5hzkkzcdtmtpb2jgo3xi6i

Conference Program

2021 2021 IEEE International Symposium on Technology and Society (ISTAS)  
Please note that this program represents the material available to conference attendees during ISTAS21 and does not reflect last-minute schedule modifications.  ...  Attendees will then participate in the online Flood Resilience Challenge, an interactive "serious game."  ...  The current paper considers how trust in A/IS can be developed in healthcare professionals and patients and the ethical implications of the development of trust.  ... 
doi:10.1109/istas52410.2021.9629150 fatcat:z4vdm66n5bcxpe4gg4zj76kjgq
« Previous Showing results 1 — 15 out of 6,734 results