Trusting the trust machine: Evaluating trust signals of blockchain applications

F Völter, N Urbach, J Padget - International Journal of Information …, 2023 - Elsevier
Abstract Information systems research emphasizes that blockchain requires trust in the
technology itself. However, we lack knowledge on the applicability of established trust cues …

[PDF][PDF] Understanding the formation of trust in IT artifacts

M Söllner, A Hoffmann, H Hoffmann, A Wacker… - 2012 - core.ac.uk
IT artifacts often take the role of a trustee in a trust relationship between users and IT
artifacts. The goal of this paper is to increase the understanding of the formation of trust in …

A framework for event log generation and knowledge representation for process mining in healthcare

R Gatta, M Vallati, J Lenkowicz, C Casá… - 2018 IEEE 30th …, 2018 - ieeexplore.ieee.org
Process Mining is of growing importance in the healthcare domain, where the quality of
delivered services depends on the suitable and efficient execution of processes encoding …

The emergence of mutual and shared understanding in the system development process

A Hoffmann, EAC Bittner, JM Leimeister - … April 8-11, 2013. Proceedings 19, 2013 - Springer
Abstract [Context and motivation] In interdisciplinary requirements engineering, stakeholders
need to understand how other disciplines think and work (mutual understanding) and agree …

[PDF][PDF] Towards Socio-Technical Design of Explicative Systems: Transparent, Interpretable and Explainable Analytics and Its Perspectives in Social Interaction …

M Atzmueller - AfCAI, 2019 - ceur-ws.org
This paper outlines an approach towards socio-technical design of explicative systems
enabling transparent, interpretable and explainable analytics. We sketch the TIE approach …

Fostering initial trust in applications–develo** and evaluating requirement patterns for application websites

A Hoffmann, H Hoffmann, M Söllner - 21st European Conference …, 2013 - papers.ssrn.com
When users first encounter an application, or decide which application from a number of
options to use, their initial trust in this application is a determinant for their willingness to …

[PDF][PDF] Transformation Requirement Pattern for Capturing Data-Intensive Applications Requirements

R Raymond, MA Savarimuthu - Available at SSRN 4035224, 2022 - papers.ssrn.com
ContextA business analyst typically encounters activities and features that they have
previously worked on as they move from project to project. Interestingly, despite the fact that …

Interdisciplinary design patterns for socially aware computing

H Baraki, K Geihs, C Voigtmann… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
The success of software applications that collect and process personal data does not only
depend on technical aspects, but is also linked to social compatibility and user acceptance …

Zodiac: System architecture implementation for a high-performance network security processor

W Haixin, B Guoqiang, C Hongyi - … International Conference on …, 2008 - ieeexplore.ieee.org
The last few years have seen many significant progresses in the field of application-specific
processors. One exemplar is Network Security Processors (NSPs) that perform various …

Requirements patterns structure for specifying and reusing software product line requirements

BI Ya'u, A Nordin, N Salleh - 2018 International Conference …, 2018 - ieeexplore.ieee.org
A well-defined structure is essential in all software development, thus providing an avenue
for smooth execution of the processes involved during various software development …