Now showing items 41-60 of 124

    • Fostering Learners’ Performance with On-demand Metacognitive Feedback 

      Papamitsiou, Zacharoula; Economides, Anastasios; Giannakos, Michail (Journal article; Peer reviewed, 2019)
      Activating learners’ deeper thinking mechanisms and reflective judgement (i.e., metacognition) improves learning performance. This study exploits visual analytics to promote metacognition and delivers task-related ...
    • From Responsible AI Governance to Competitive Performance: The Mediating Role of Knowledge Management Capabilities 

      Papagiannidis, Emmanouil; Mikalef, Patrick; Krogstie, John; Conboy, Kieran (Journal article; Peer reviewed, 2022)
      In a constantly changing environment, researchers and practitioners are concerned with the issue of whether responsible artificial intelligence (AI) governance can help build competitive advantage. Responsible AI governance ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • Gender-Inclusive Design: Case Studies and Guidelines 

      Szlavi, Anna; Guedes, Leandro (Journal article, 2023)
      The importance of inclusivity as a value in our social contexts is increasing; thus, it is not unusual that the software industry has started to embrace it. The need for such a consideration stems from the fact that the ...
    • A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange 

      Pan, Jiaxin; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We propose a generic construction of password-based authenticated key exchange (PAKE) from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure against plaintext-checkable attacks (OW-PCA), we prove ...
    • Goalkeeper: A Zero-Sum Exergame for Motivating Physical Activity 

      Niforatos, Evangelos; Tran, Camilla; Pappas, Ilias; Giannakos, Michail (Peer reviewed; Journal article, 2021)
      Incentives and peer competition have so far been employed independently for increasing physical activity. In this paper, we introduce Goalkeeper, a mobile application that utilizes deposit contracts for motivating physical ...
    • Hellinger Metrics for Validating High Fidelity Simulators Using Target Tracking 

      Vasstein, Kjetil; Helgesen, Øystein Kaarstad; Brekke, Edmund Førland (Journal article; Peer reviewed, 2023)
      To achieve autonomy at sea, it is believed simulations will be essential in testing, analysing and verifying autonomous systems due to the scarcity and high cost of obtaining real data for all relevant scenarios. This ...
    • Hierarchical Identity-Based Encryption with Tight Multi-challenge Security 

      Langrehr, Roman; Pan, Jiaxin (Peer reviewed; Journal article, 2020)
      We construct the first hierarchical identity-based encryption (HIBE) scheme with tight adaptive security in the multi-challenge setting, where adversaries are allowed to ask for ciphertexts for multiple adaptively chosen ...
    • Highly Efficient Key Exchange Protocols with Optimal Tightness 

      Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2019)
      In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, ...
    • How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data 

      Pappas, Ilias; Sharma, Kshitij; Mikalef, Patrick; Giannakos, Michail (Peer reviewed; Journal article, 2020)
      Abstract. This study examines how quickly we can predictusers’ ratings on vis-ual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship.To predict users’ ratings, first we capturegaze behaviorwhile ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs 

      Haines, Thomas Edmund; Gritti, Clementine Jeanne Pierrette (Journal article; Peer reviewed, 2019)
      Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability ...
    • Improving the Analysis of GPC in Real-Time Calculus 

      Tang, Yue; Jiang, Yuming; Guan, Nan (Journal article; Peer reviewed, 2019)
      Real-Time Calculus (RTC) is a framework for modeling and performance analysis of real-time networked systems. In RTC, workload and resources are modeled as arrival and service curves, and processing semantics are modeled ...
    • In-Service Teacher Training and Self-efficacy 

      Jørgen, Thorsnes; Rouhani, Majid; Divitini, Monica (Peer reviewed; Journal article, 2020)
      Programming is increasingly introduced in secondary schools, both as a stand-alone subject or integrated into other subjects, leading to growing attention to the training of in-service teachers. Teachers need to learn both ...
    • Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used 

      Sütterlin, Stefan; Ask, Torvald Fossåen; Mägerle, Sophia; Glöckler, Sandra; Wolf, Leandra; Schray, Julian; Chandi, Alava; Bursac, Teodora; Khodabakhsh, Ali; Knox, Benjamin James; Canham, Matthew; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2023)
      AI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in ...
    • An Information Systems Design Theory for Digital Broker Platforms 

      Bley, Katja; Hentschel, Raoul; Pappas, Ilias (Peer reviewed; Journal article, 2022)
      Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ...
    • Investigating Aid Effectiveness in Developing Countries: The Case of Nepal 

      Karki, Yashoda; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Lattice-Based Authenticated Key Exchange with Tight Security 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ...
    • Lattice-Based Proof of Shuffle and Applications to Electronic Voting 

      Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor (Peer reviewed; Journal article, 2021)
      A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ...