Trusting the trust machine: Evaluating trust signals of blockchain applications
Abstract Information systems research emphasizes that blockchain requires trust in the
technology itself. However, we lack knowledge on the applicability of established trust cues …
technology itself. However, we lack knowledge on the applicability of established trust cues …
[PDF][PDF] Understanding the formation of trust in IT artifacts
IT artifacts often take the role of a trustee in a trust relationship between users and IT
artifacts. The goal of this paper is to increase the understanding of the formation of trust in …
artifacts. The goal of this paper is to increase the understanding of the formation of trust in …
A framework for event log generation and knowledge representation for process mining in healthcare
Process Mining is of growing importance in the healthcare domain, where the quality of
delivered services depends on the suitable and efficient execution of processes encoding …
delivered services depends on the suitable and efficient execution of processes encoding …
The emergence of mutual and shared understanding in the system development process
Abstract [Context and motivation] In interdisciplinary requirements engineering, stakeholders
need to understand how other disciplines think and work (mutual understanding) and agree …
need to understand how other disciplines think and work (mutual understanding) and agree …
[PDF][PDF] Towards Socio-Technical Design of Explicative Systems: Transparent, Interpretable and Explainable Analytics and Its Perspectives in Social Interaction …
M Atzmueller - AfCAI, 2019 - ceur-ws.org
This paper outlines an approach towards socio-technical design of explicative systems
enabling transparent, interpretable and explainable analytics. We sketch the TIE approach …
enabling transparent, interpretable and explainable analytics. We sketch the TIE approach …
Fostering initial trust in applications–develo** and evaluating requirement patterns for application websites
When users first encounter an application, or decide which application from a number of
options to use, their initial trust in this application is a determinant for their willingness to …
options to use, their initial trust in this application is a determinant for their willingness to …
[PDF][PDF] Transformation Requirement Pattern for Capturing Data-Intensive Applications Requirements
R Raymond, MA Savarimuthu - Available at SSRN 4035224, 2022 - papers.ssrn.com
ContextA business analyst typically encounters activities and features that they have
previously worked on as they move from project to project. Interestingly, despite the fact that …
previously worked on as they move from project to project. Interestingly, despite the fact that …
Interdisciplinary design patterns for socially aware computing
The success of software applications that collect and process personal data does not only
depend on technical aspects, but is also linked to social compatibility and user acceptance …
depend on technical aspects, but is also linked to social compatibility and user acceptance …
Zodiac: System architecture implementation for a high-performance network security processor
W Haixin, B Guoqiang, C Hongyi - … International Conference on …, 2008 - ieeexplore.ieee.org
The last few years have seen many significant progresses in the field of application-specific
processors. One exemplar is Network Security Processors (NSPs) that perform various …
processors. One exemplar is Network Security Processors (NSPs) that perform various …
Requirements patterns structure for specifying and reusing software product line requirements
A well-defined structure is essential in all software development, thus providing an avenue
for smooth execution of the processes involved during various software development …
for smooth execution of the processes involved during various software development …