A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming
[chapter]
2012
Lecture Notes in Computer Science
The workshop will explore the core challenges associated with the increasing use of serious gaming in particular those systems that seek to persuade users to alter their behavior. ...
The workshop will focus on three main areas: data privacy, trustworthiness and usability. The workshop particularly welcomes submissions from people who seek to bridge the divide between these topics. ...
As a result there is a need to explore the data privacy and protection issues that surround serious and persuasive gaming. ...
doi:10.1007/978-3-642-33542-6_77
fatcat:3ew2k4laxzhwphmwwabkhi6nh4
ETICA Workshop on Computer Ethics: Exploring Normative Issues
[chapter]
2011
IFIP Advances in Information and Communication Technology
This paper discusses the ethical views of the workshop participants and contrasts them with the findings of the ethical analysis within the ETICA project. ...
Workshop participants were asked to reflect on the ethical issues they saw as relevant and likely to arise from the technology. ...
Many of the VR / AR applications are in the area of gaming which raises ethical concerns about the violence that can be found in many such games. ...
doi:10.1007/978-3-642-20769-3_6
fatcat:xjb3ileomzbp5j7q2o4gpo4t6e
AAAI-07 Workshop Reports
2007
The AI Magazine
However, as statistical approaches gained in power and popularity, and some kinds of data became more plentiful, machine learning as a field moved away from this kind of learning, which requires strong ...
In the mid to late 1980s there was a flurry of papers using explanationbased techniques to learn how to perform complex actions by observing (or interpreting descriptions of) human performance. ...
The workshop was held in conjunction with the finals of the 2007 Trading Agent Competition. Two game scenarios and two challenge events attracted 39 entries. ...
doi:10.1609/aimag.v28i4.2071
dblp:journals/aim/AnandBBBCCDDDEGGGHJJJKKLLLLMMMMNNOOPRRRSSWW07
fatcat:kv7si5jmjnekjkr54qlcmoh6rm
Security and Morality: A Tale of User Deceit
2006
Workshop on Models of Trust for the Web
There has been considerable debate about the apparent irrationality of end users in choosing with whom to share information, with much of the discourse crystallized in research on phishing. ...
Usability must be more than the interface design, but rather integrate security and privacy into a trust interaction. ...
The definition of trust used here and the set of methods used to explore trust perfectly coincide and are based in the quantitative, game-theory tradition of experiments in trust in which trust is an enacted ...
dblp:conf/mtw/CampMG06
fatcat:rgq7elt22nhh5hje3vpwgel5h4
A preliminary investigation of user incentives to leverage crowdsensing activities
2013
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
While exploiting the wisdom of the crowd provides huge benefits to pervasive applications, one of the key challenges remains to motivate people to contribute to flow of data by sharing some of the capabilities ...
In this paper, we therefore report on the APISENSE platform, a participative platform that help scientists to collect realistic datasets from a population of voluntary participants. ...
or on ethical and privacy issues related to the storage of collected traces. ...
doi:10.1109/percomw.2013.6529481
dblp:conf/percom/HadererRS13
fatcat:hrvt7owduvbydnxoilxk2gsjli
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned
2014
2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
We describe our experience gained while exploring practical security and privacy problems in a real-world, largescale social network (i.e., Facebook), and summarize our conclusions in a series of "lessons ...
Gaining the audience's engagement and trust was essential to the success of our user study. ...
This work was supported in part by the FP7 project SysSec funded by the EU Commission under grant agreement no 257007, and by the MIUR under the FIRB2013 FACE grant. ...
doi:10.1109/badgers.2014.9
dblp:conf/badgers/PolakisMZK14
fatcat:mkb4zbvekvbnxgsuxcxa7k7hom
Privacy controls for always-listening devices
2019
Proceedings of the New Security Paradigms Workshop
Though potentially useful, the continuous recording and analysis of speech can pose a serious threat to individuals' privacy. ...
Intelligent voice assistants (IVAs) and other voice-enabled devices already form an integral component of the Internet of Things and will continue to grow in popularity. ...
of Security program; and the generosity of Cisco and Mozilla. ...
doi:10.1145/3368860.3368867
dblp:conf/nspw/MalkinEW19
fatcat:2tyglap6rnaizononywbmvrsr4
Lifting the Lid: How Prison Writing Workshops Shed Light on the Social Shadow
2016
Community Literacy Journal
I offer here a first person narrative reflection on the connections between a writing workshops and raising social awareness of the realities of day-to-day lives of inmates. ...
Appropriate writing pedagogy, personal challenges to meeting to the workshops, and the need to publish inmate stories inform the essay. ...
Consider the work of J., an addict, a self-identified ex-member of the Aryan Brotherhood, and one of the more serious members of the workshop: J. grew up in Phoenix, lived on the streets after he dropped ...
doi:10.25148/clj.10.2.009263
fatcat:v3z76gjvwzarvp27jxv44tak4i
Using adaptive architecture to support Yoga practices: Social considerations for design
2014
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)
We explore the social considerations of deploying this novel technology, and then examine the different possibilities for interaction. ...
ExoBuilding is an in-house prototypical example of Adaptive Architecture, which actuates in response to breathing and heartrate of its occupants. ...
In two meetings and one workshop we explored the possibilities of how to integrate ExoBuilding into the practice of yoga and the practice of teaching yoga. ...
doi:10.1109/percomw.2014.6815233
dblp:conf/percom/JagerMS14
fatcat:5eoszhxgnzayvgqfc5qkd6j2jq
Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112)
2014
Dagstuhl Manifestos
The rapid emergence and adoption of Massive Open Online Courses (MOOCs) has raised new questions and rekindled old debates in higher education. ...
Eight provocative positions are put forward, in hopes of aiding policymakers, academics, administrators, and learners regarding the potential future of MOOCs in higher education. ...
Ethical: more research on the ethical use of MOOCs data is needed to understand which kind of information should be accessible to whom, focusing on the privacy issues related to the data produced by the ...
doi:10.4230/dagman.4.1.1
dblp:journals/dagstuhl-manifestos/DillenbourgFKMW14
fatcat:p534ryue7nfpdn4u357ioj6isi
Design Challenges for Social Interactions at Factory Floor
2019
2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)
Industry 4.0, describes the transition of labor into more digitized and automated era. ...
In this paper we present the initial step in recognizing the design challenges for a project developing social gamified eHealth applications to the factory floor. ...
ACKNOWLEDGMENTS This research is done in a Business Finland funded project Reboot Finland IoT Factory 33/31/2018 supported by Academy of Finland 6Genesis Flagship (318927). ...
doi:10.1109/vs-games.2019.8864601
dblp:conf/vsgames/ImmonenAM19
fatcat:7w56cnx75jfnvmt37mioijpiqe
Digital health now and in the future: Findings from a participatory design stakeholder workshop
2017
Digital Health
provision and efficacy and ensuring ethical management of personal health data. ...
At the same time, personal data privacy and security need protection. ...
The topic of the privacy and security of citizens' health and medical information was recognised as important in all groups. ...
doi:10.1177/2055207617740018
pmid:29942616
pmcid:PMC6001191
fatcat:zhusjybasrferdcxtz24fu66lm
Skullduggery in peer-to-peer networks and the need for a new cyber-social theory
2021
International Workshop on Socio-Technical Perspective in IS Development
, and then create and hold the record of transactions and asset holdings (the ledger). ...
DL/blockchains are operationalised through the combined actions of complex software algorithms and digitally distributed Peer-to-Peer (P2P) networks which act together to validate data and transactions ...
the co-constitution between the social and the technical does not imply equality", and they argue for IS research that explores these ethical dimensions. ...
dblp:conf/stpis/Champion21
fatcat:n4vnkfo6q5aczklrptqqabjwha
Security and usability
2008
Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07
We examine some of these requirements as set by major Canadian banks, in terms of security and usability. ...
Online banking is one of the most sensitive tasks performed by general Internet users. ...
Acknowledgements We thank anonymous NSPW reviewers for their comments, and NSPW 2007 attendees and members of the Carleton's Digital Security Group for their enthusiastic discussion on this topic. ...
doi:10.1145/1600176.1600178
dblp:conf/nspw/MannanO07
fatcat:5h5r5hzkkzcdtmtpb2jgo3xi6i
Conference Program
2021
2021 IEEE International Symposium on Technology and Society (ISTAS)
Please note that this program represents the material available to conference attendees during ISTAS21 and does not reflect last-minute schedule modifications. ...
Attendees will then participate in the online Flood Resilience Challenge, an interactive "serious game." ...
The current paper considers how trust in A/IS can be developed in healthcare professionals and patients and the ethical implications of the development of trust. ...
doi:10.1109/istas52410.2021.9629150
fatcat:z4vdm66n5bcxpe4gg4zj76kjgq
« Previous
Showing results 1 — 15 out of 6,734 results