Search results for "Web"
showing 10 items of 2018 documents
Graphical information models as interfaces for Web document repositories
2000
In interorganisational processes, documents are used to record information created during the processes. Legislative processes involving several legislative organisations, or manufacturing processes involving complicated networks of companies and officials are examples of such processes. In the contemporary computerised environments a great deal of the recorded information is scattered in different kinds of Web repositories with different kinds of interfaces. The repositories should serve as valuable knowledge assets but their use may be difficult and even the knowledge about the kinds of repositories available may be insufficient. The paper presents a method for improving information manag…
Distributed Coverage of Ego Networks in F2F Online Social Networks
2016
Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …
Technical Briefing: Hands-On Session on the Development of Trustworthy AI Software
2021
Following various real-world incidents involving both purely digital and cyber-physical Artificial Intelligence (AI) systems, AI Ethics has become a prominent topic of discussion in both research and practice, accompanied by various calls for trustworthy AI systems. Failures are often costly, and many of them stem from issues that could have been avoided during development. For example, AI ethics issues, such as data privacy are currently highly topical. However, implementing AI ethics in practice remains a challenge for organizations. Various guidelines have been published to aid companies in doing so, but these have not seen widespread adoption and may feel impractical. In this technical …
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications
2007
User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.
DICOM E-mail: Germany's minimum standard for teleradiology
2005
Abstract Due to the lack of a standard for teleradiology, the IT Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) of the German Radiological Society (Deutsche Rontgengesellschaft, DRG) has set up an initiative for standardizing telemedicine. E-mail has been selected as the ideal basis for ad hoc connections in teleradiology since it is both easy to implement and use. The DICOM standard offers the option of appending DICOM data types as MIME attachments to any e-mail, thus enabling the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g., data privacy) that must be obeyed and implemented. The first recommendation was introduced at th…
Internet of things and privacy preserving technologies
2009
In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.
Privacy in Social Network Sites
2011
Are we running out of privacy? Nowadays, for example, we are concerned about whether the maintenance of a private sphere in online environments has become a luxury commodity (Papacharissi 2009). Questions of this kind are justified as online communication plays an increasingly important role in people’s everyday life (cf., e.g., Lundby 2009). While it seems exaggerated to stigmatize today’s youth as “communication junkies” (Patalong 2010), online conversations are increasingly becoming a functional equivalent to face to face communication (Beer 2008). However, some significant differences between online and “offline” communication remain. Face to face communication may remain largely intima…
Aggregation of the web performance of internal university units as a method of quantitative analysis of a university system: The case of Spain
2013
The aggregation of web performance (page count and visibility) of internal university units could constitute a more precise indicator than the overall web performance of the universities and, therefore, be of use in the design of university web rankings. In order to test this hypothesis, a longitudinal analysis of the internal units of the Spanish university system was conducted over the course of 2010. For the 13800 URLs identified, page count and visibility was calculated using the Yahoo API. The internal values obtained were aggregated by university and compared with the values obtained from the analysis of the university general URLs. The results indicate that, although the correlations…
Schema-Based Visual Queries over Linked Data Endpoints
2019
We present the option to use the schema-based visual query tool ViziQuer over realistic Linked Data endpoints. We describe the tool meta-schema structure and the means for the endpoint schema retrieval both from an OWL ontology and from a SPARQL endpoint. We report on a store of the endpoint-specific schemas and the options to support the schema presentation to the end-user both as a class tree within the environment and as external visual diagram.
Export of Relational Databases to RDF Databases: A Case Study
2010
The vast amount of business information nowadays is stored in relational databases. For the Semantic Web vision to become a reality, we need ways how to exploit this data in form of RDF triples. The universal and commonly accepted solution for this problem still does not exist. In most cases, mapping languages are used for specification of correspondences between OWL ontology and DB schema. At the same time, these languages generally are not well suited for specification of mappings in cases when there is a substantial difference between OWL ontology and DB schema. In this paper, we describe a new model transformation-based method for specification of correspondences between the elements of…