[HTML][HTML] XAIR: a systematic metareview of explainable AI (XAI) aligned to the software development process
Background: Open Access Systematic Review XAIR: A Systematic Metareview of
Explainable AI (XAI) Aligned to the Software Development Process by Tobias Clement 1,*,† …
Explainable AI (XAI) Aligned to the Software Development Process by Tobias Clement 1,*,† …
A meta survey of quality evaluation criteria in explanation methods
The evaluation of explanation methods has become a significant issue in explainable
artificial intelligence (XAI) due to the recent surge of opaque AI models in decision support …
artificial intelligence (XAI) due to the recent surge of opaque AI models in decision support …
[KNYGA][B] Trustworthy cyber-physical systems
G Mohammadi - 2019 - Springer
In the era of cyber-physical systems (CPS), almost all activities of our daily life are supported
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …
by a multitude of heterogeneous, loosely coupled systems communicating over the Internet …
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
Personal data have become a central asset for multiple enterprise applications and online
services offered by private companies, public organisations or a combination of both. The …
services offered by private companies, public organisations or a combination of both. The …
A framework for enabling trust requirements in social cloud applications
Cloud applications entail the provision of a huge amount of heterogeneous, geographically
distributed resources managed and shared by many different stakeholders who often do not …
distributed resources managed and shared by many different stakeholders who often do not …
Managing trust and control when offshoring information systems development projects by adjusting project goals
This article presents a study of two projects focusing on the relationships of two Nordic
clients with suppliers in low-cost countries. It explores the interplay between trust and control …
clients with suppliers in low-cost countries. It explores the interplay between trust and control …
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
Cloud computing is a new paradigm with a promising potential. However, issues of security,
privacy, and trust raise concerns and discourage its adoption. In previous work we …
privacy, and trust raise concerns and discourage its adoption. In previous work we …
[HTML][HTML] Modelling the trust value for human agents based on real-time human states in human-autonomous teaming systems
The modelling of trust values on agents is broadly considered fundamental for decision-
making in human-autonomous teaming (HAT) systems. Compared to the evaluation of trust …
making in human-autonomous teaming (HAT) systems. Compared to the evaluation of trust …
Modeling trust relationships for develo** trustworthy information systems
Develo** a trustworthy information system is a challenging task. The overall
trustworthiness of an information system depends on trust relationships that are generally …
trustworthiness of an information system depends on trust relationships that are generally …
A meta-model for legal compliance and trustworthiness of information systems
Abstract Information systems manage and hold a huge amount of important and critical
information. For this reason, information systems must be trustworthy and should comply …
information. For this reason, information systems must be trustworthy and should comply …