Now showing items 41-60 of 123

    • Fostering Learners’ Performance with On-demand Metacognitive Feedback 

      Papamitsiou, Zacharoula; Economides, Anastasios; Giannakos, Michail (Journal article; Peer reviewed, 2019)
      Activating learners’ deeper thinking mechanisms and reflective judgement (i.e., metacognition) improves learning performance. This study exploits visual analytics to promote metacognition and delivers task-related ...
    • From Responsible AI Governance to Competitive Performance: The Mediating Role of Knowledge Management Capabilities 

      Papagiannidis, Emmanouil; Mikalef, Patrick; Krogstie, John; Conboy, Kieran (Journal article; Peer reviewed, 2022)
      In a constantly changing environment, researchers and practitioners are concerned with the issue of whether responsible artificial intelligence (AI) governance can help build competitive advantage. Responsible AI governance ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • Gender-Inclusive Design: Case Studies and Guidelines 

      Szlavi, Anna; Guedes, Leandro (Journal article, 2023)
      The importance of inclusivity as a value in our social contexts is increasing; thus, it is not unusual that the software industry has started to embrace it. The need for such a consideration stems from the fact that the ...
    • A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange 

      Pan, Jiaxin; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We propose a generic construction of password-based authenticated key exchange (PAKE) from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure against plaintext-checkable attacks (OW-PCA), we prove ...
    • Goalkeeper: A Zero-Sum Exergame for Motivating Physical Activity 

      Niforatos, Evangelos; Tran, Camilla; Pappas, Ilias; Giannakos, Michail (Peer reviewed; Journal article, 2021)
      Incentives and peer competition have so far been employed independently for increasing physical activity. In this paper, we introduce Goalkeeper, a mobile application that utilizes deposit contracts for motivating physical ...
    • Hierarchical Identity-Based Encryption with Tight Multi-challenge Security 

      Langrehr, Roman; Pan, Jiaxin (Peer reviewed; Journal article, 2020)
      We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive security in the multi-challenge setting, where adversaries are allowed to ask for ciphertexts for multiple adaptively chosen ...
    • Highly Efficient Key Exchange Protocols with Optimal Tightness 

      Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2019)
      In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, ...
    • How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data 

      Pappas, Ilias; Sharma, Kshitij; Mikalef, Patrick; Giannakos, Michail (Peer reviewed; Journal article, 2020)
      Abstract. This study examines how quickly we can predictusers’ ratings on vis-ual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship.To predict users’ ratings, first we capturegaze behaviorwhile ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs 

      Haines, Thomas Edmund; Gritti, Clementine Jeanne Pierrette (Journal article; Peer reviewed, 2019)
      Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability ...
    • Improving the Analysis of GPC in Real-Time Calculus 

      Tang, Yue; Jiang, Yuming; Guan, Nan (Journal article; Peer reviewed, 2019)
      Real-Time Calculus (RTC) is a framework for modeling and performance analysis of real-time networked systems. In RTC, workload and resources are modeled as arrival and service curves, and processing semantics are modeled ...
    • In-Service Teacher Training and Self-efficacy 

      Jørgen, Thorsnes; Rouhani, Majid; Divitini, Monica (Peer reviewed; Journal article, 2020)
      Programming is increasingly introduced in secondary schools, both as a stand-alone subject or integrated into other subjects, leading to growing attention to the training of in-service teachers. Teachers need to learn both ...
    • Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used 

      Sütterlin, Stefan; Ask, Torvald Fossåen; Mägerle, Sophia; Glöckler, Sandra; Wolf, Leandra; Schray, Julian; Chandi, Alava; Bursac, Teodora; Khodabakhsh, Ali; Knox, Benjamin James; Canham, Matthew; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2023)
      AI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in ...
    • An Information Systems Design Theory for Digital Broker Platforms 

      Bley, Katja; Hentschel, Raoul; Pappas, Ilias (Peer reviewed; Journal article, 2022)
      Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ...
    • Investigating Aid Effectiveness in Developing Countries: The Case of Nepal 

      Karki, Yashoda; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Lattice-Based Authenticated Key Exchange with Tight Security 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ...
    • Lattice-Based Proof of Shuffle and Applications to Electronic Voting 

      Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor (Peer reviewed; Journal article, 2021)
      A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ...
    • Lattice-Based Signatures with Tight Adaptive Corruptions and More 

      Pan, Jiaxin; Wagner, Benedikt (Peer reviewed; Journal article, 2022)
      We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the previous tight constructions whose security is solely based on number-theoretic ...