To see the other types of publications on this topic, follow the link: Trust in machines.

Dissertations / Theses on the topic 'Trust in machines'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 43 dissertations / theses for your research on the topic 'Trust in machines.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Norstedt, Emil, and Timmy Sahlberg. "Human Interaction with Autonomous machines: Visual Communication to Encourage Trust." Thesis, Blekinge Tekniska Högskola, Institutionen för maskinteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19706.

Full text
Abstract:
En pågående utveckling sker inom konstruktionsbranschen där maskiner går från att styras manuellt av en mänsklig förare till styras autonomt, d.v.s. utan mänsklig förare. Detta arbete har varit i samarbete med Volvo CE och deras nya autonoma hjullastare. Då maskinen kommer operera i en miljö kring människor, så krävs en hög säkerhet för att eliminera olyckor. Syftet med arbetet har varit att utveckla ett system för öka säkerheten och förtroendet för människorna i närheten av den autonoma maskinen. Systemet byggs på visuell kommunikation för att uppnå en tillit mellan parterna. Arbetet har baserats på en iterativ process där prototypande, testande och analysering har varit i focus för att uppnå ett lyckat resultat. Genom skapande av modeller med olika funktioner så har en större förståelse kring hur visuell kommunikation mellan människa och maskin kan skapas för att bygga upp en tillit sinsemellan. Detta resulterade i ett koncept som bygger på en kommunikation via ögon från maskinen. Ögonkontakt har visats sig vara en viktig faktor för människor för att skapa ett förtroende för någon eller något i obekväma och utsatta situationer. Maskinen förmedlar olika uttryck genom att ändra färg och form på ögonen för att uppmärksamma och informera människor som rör sig i närheten av maskinen. Genom att anpassa färg och form på ögon kan information uppfattas på olika sätt. Med denna typ av kommunikation kan ett förtroende för maskinen skapas och på så sätt höjs säkerhet och tillit.
Ongoing development is happening within the construction industry. Machines are transformed from being operated by humans to being autonomous. This project has been a collaboration with Volvo Construction Equipment (Volvo CE), and their new autonomous wheel loader. The autonomous machine is supposed to operate in the same environment as people. Therefore, a developed safety system is required to eliminate accidents. The purpose has been developing a system to increase the safety for the workers and to encourage trust for the autonomous machine. The system is based on visual communication to achieve trust between the machine and the people around it. An iterative process, with a focus on testing, prototyping, and analysing, has been used to accomplish a successful result. Better understanding has been developed on how to design a human-machine-interface to encourage trust by creating models with a variety of functions. The iterative process resulted in a concept that communicates through eyes. Eye-contact is an essential factor for creating trust in unfamiliar and exposed situations. The solution mediating different expressions by changing the colour and shape of the eyes to create awareness and to inform people moving around in the same environment. Specific information can be mediated in various situations by adopting the colour and shape of the eyes. Trust can be encouraged for the autonomous machine using this way of communicating.
APA, Harvard, Vancouver, ISO, and other styles
2

Conrad, Tim. "The machine we trust and other stories." View electronic thesis (PDF), 2009. http://dl.uncw.edu/etd/2009-1/rp/conradt/timconrad.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akteke, Basak. "Derivative Free Optimization Methods: Application In Stirrer Configuration And Data Clustering." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606591/index.pdf.

Full text
Abstract:
Recent developments show that derivative free methods are highly demanded by researches for solving optimization problems in various practical contexts. Although well-known optimization methods that employ derivative information can be very effcient, a derivative free method will be more effcient in cases where the objective function is nondifferentiable, the derivative information is not available or is not reliable. Derivative Free Optimization (DFO) is developed for solving small dimensional problems (less than 100 variables) in which the computation of an objective function is relatively expensive and the derivatives of the objective function are not available. Problems of this nature more and more arise in modern physical, chemical and econometric measurements and in engineering applications, where computer simulation is employed for the evaluation of the objective functions. In this thesis, we give an example of the implementation of DFO in an approach for optimizing stirrer configurations, including a parametrized grid generator, a flow solver, and DFO. A derivative free method, i.e., DFO is preferred because the gradient of the objective function with respect to the stirrer&rsquo
s design variables is not directly available. This nonlinear objective function is obtained from the flow field by the flow solver. We present and interpret numerical results of this implementation. Moreover, a contribution is given to a survey and a distinction of DFO research directions, to an analysis and discussion of these. We also state a derivative free algorithm used within a clustering algorithm in combination with non-smooth optimization techniques to reveal the effectiveness of derivative free methods in computations. This algorithm is applied on some data sets from various sources of public life and medicine. We compare various methods, their practical backgrounds, and conclude with a summary and outlook. This work may serve as a preparation of possible future research.
APA, Harvard, Vancouver, ISO, and other styles
4

Ross, Jennifer. "MODERATORS OF TRUST AND RELIANCE ACROSS MULTIPLE DECISION AIDS." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3975.

Full text
Abstract:
The present work examines whether user's trust of and reliance on automation, were affected by the manipulations of user's perception of the responding agent. These manipulations included agent reliability, agent type, and failure salience. Previous work has shown that automation is not uniformly beneficial; problems can occur because operators fail to rely upon automation appropriately, by either misuse (overreliance) or disuse (underreliance). This is because operators often face difficulties in understanding how to combine their judgment with that of an automated aid. This difficulty is especially prevalent in complex tasks in which users rely heavily on automation to reduce their workload and improve task performance. However, when users rely on automation heavily they often fail to monitor the system effectively (i.e., they lose situation awareness – a form of misuse). However, if an operator realizes a system is imperfect and fails, they may subsequently lose trust in the system leading to underreliance. In the present studies, it was hypothesized that in a dual-aid environment poor reliability in one aid would impact trust and reliance levels in a companion better aid, but that this relationship is dependent upon the perceived aid type and the noticeability of the errors made. Simulations of a computer-based search-and-rescue scenario, employing uninhabited/unmanned ground vehicles (UGVs) searching a commercial office building for critical signals, were used to investigate these hypotheses. Results demonstrated that participants were able to adjust their reliance and trust on automated teammates depending on the teammate's actual reliability levels. However, as hypothesized there was a biasing effect among mixed-reliability aids for trust and reliance. That is, when operators worked with two agents of mixed-reliability, their perception of how reliable and to what degree they relied on the aid was effected by the reliability of a current aid. Additionally, the magnitude and direction of how trust and reliance were biased was contingent upon agent type (i.e., 'what' the agents were: two humans, two similar robotic agents, or two dissimilar robot agents). Finally, the type of agent an operator believed they were operating with significantly impacted their temporal reliance (i.e., reliance following an automation failure). Such that, operators were less likely to agree with a recommendation from a human teammate, after that teammate had made an obvious error, than with a robotic agent that had made the same obvious error. These results demonstrate that people are able to distinguish when an agent is performing well but that there are genuine differences in how operators respond to agents of mixed or same abilities and to errors by fellow human observers or robotic teammates. The overall goal of this research was to develop a better understanding how the aforementioned factors affect users' trust in automation so that system interfaces can be designed to facilitate users' calibration of their trust in automated aids, thus leading to improved coordination of human-automation performance. These findings have significant implications to many real-world systems in which human operators monitor the recommendations of multiple other human and/or machine systems.
Ph.D.
Department of Psychology
Sciences
Psychology PhD
APA, Harvard, Vancouver, ISO, and other styles
5

Torre, Ilaria. "The impact of voice on trust attributions." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9858.

Full text
Abstract:
Trust and speech are both essential aspects of human interaction. On the one hand, trust is necessary for vocal communication to be meaningful. On the other hand, humans have developed a way to infer someone’s trustworthiness from their voice, as well as to signal their own. Yet, research on trustworthiness attributions to speakers is scarce and contradictory, and very often uses explicit data, which do not predict actual trusting behaviour. However, measuring behaviour is very important to have an actual representation of trust. This thesis contains 5 experiments aimed at examining the influence of various voice characteristics — including accent, prosody, emotional expression and naturalness — on trusting behaviours towards virtual players and robots. The experiments have the "investment game"—a method derived from game theory, which allows to measure implicit trustworthiness attributions over time — as their main methodology. Results show that standard accents, high pitch, slow articulation rate and smiling voice generally increase trusting behaviours towards a virtual agent, and a synthetic voice generally elicits higher trustworthiness judgments towards a robot. The findings also suggest that different voice characteristics influence trusting behaviours with different temporal dynamics. Furthermore, the actual behaviour of the various speaking agents was modified to be more or less trustworthy, and results show that people’s trusting behaviours develop over time accordingly. Also, people reinforce their trust towards speakers that they deem particularly trustworthy when these speakers are indeed trustworthy, but punish them when they are not. This suggests that people’s trusting behaviours might also be influenced by the congruency of their first impressions with the actual experience of the speaker’s trustworthiness — a "congruency effect". This has important implications in the context of Human–Machine Interaction, for example for assessing users’ reactions to speaking machines which might not always function properly. Taken together, the results suggest that voice influences trusting behaviour, and that first impressions of a speaker’s trustworthiness based on vocal cues might not be indicative of future trusting behaviours, and that trust should be measured dynamically.
APA, Harvard, Vancouver, ISO, and other styles
6

Parker, Christopher Alonzo. "K x N Trust-Based Agent Reputation." VCU Scholars Compass, 2006. http://scholarscompass.vcu.edu/etd/702.

Full text
Abstract:
In this research, a multi-agent system called KMAS is presented that models an environment of intelligent, autonomous, rational, and adaptive agents that reason about trust, and adapt trust based on experience. Agents reason and adapt using a modification of the k-Nearest Neighbor algorithm called (k X n) Nearest Neighbor where k neighbors recommend reputation values for trust during each of n interactions. Reputation allows a single agent to receive recommendations about the trustworthiness of others. One goal is to present a recommendation model of trust that outperforms MAS architectures relying solely on direct agent interaction. A second goal is to converge KMAS to an emergent system state where only successful cooperation is allowed. Three experiments are chosen to compare KMAS against a non-(k X n) MAS, and between different variations of KMAS execution. Research results show KMAS converges to the desired state, and in the context of this research, KMAS outperforms a direct interaction-based system.
APA, Harvard, Vancouver, ISO, and other styles
7

Mayer, Andrew K. "Manipulation of user expectancies effects on reliance, compliance, and trust using an automated system /." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abuhamad, Grace M. (Grace Marie). "The fallacy of equating "blindness" with fairness : ensuring trust in machine learning applications to consumer credit." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122094.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 75-82).
Fifty years ago, the United States Congress coalesced around a vision for fair consumer credit: equally accessible by all consumers, and developed on accurate and relevant information, with controls for consumer privacy. In two foundational pieces of legislation, the Fair Credit Reporting Act (FCRA) and the Equal Credit Opportunity Act (ECOA), legislators described mechanisms by which these goals would be met, including, most notably, prohibiting certain information, such as a consumer's race, as the basis for credit decisions, under the assumption that being "blind" to this information would prevent wrongful discrimination. While the policy goals for fair credit are still valid today, the mechanisms designed to achieve them are no longer effective.
The consumer credit industry is increasingly interested in using new data and machine learning modeling techniques to determine consumer creditworthiness, and with these technological advances come new risks not mitigated by existing mechanisms. This thesis evaluates how these "alternative" credit processes pose challenges to the mechanisms established in the FCRA and the ECOA and their vision for fairness. "Alternative" data and models facilitate inference or prediction of consumer information, which make them non-compliant. In particular, this thesis investigates the idea that "blindness" to certain attributes hinders consumer fairness more than it helps since it limits the ability to determine whether wrongful discrimination has occurred and to build better performing models for populations that have been historically underscored.
This thesis concludes with four recommendations to modernize fairness mechanisms and ensure trust in the consumer credit system by: 1) expanding the definition of consumer report under the FCRA; 2) encouraging model explanations and transparency; 3) requiring self-testing using prohibited information; and 4) permitting the use of prohibited information to allow for more comprehensive models.
This work was partially supported by the MIT-IBM Watson AI Lab and the Hewlett Foundation through the MIT Internet Policy Research Initiative (IPRI)
by Grace M. Abuhamad.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society
APA, Harvard, Vancouver, ISO, and other styles
9

Templeton, Julian. "Designing Robust Trust Establishment Models with a Generalized Architecture and a Cluster-Based Improvement Methodology." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/42556.

Full text
Abstract:
In Multi-Agent Systems consisting of intelligent agents that interact with one another, where the agents are software entities which represent individuals or organizations, it is important for the agents to be equipped with trust evaluation models which allow the agents to evaluate the trustworthiness of other agents when dishonest agents may exist in an environment. Evaluating trust allows agents to find and select reliable interaction partners in an environment. Thus, the cost incurred by an agent for establishing trust in an environment can be compensated if this improved trustworthiness leads to an increased number of profitable transactions. Therefore, it is equally important to design effective trust establishment models which allow an agent to generate trust among other agents in an environment. This thesis focuses on providing improvements to the designs of existing and future trust establishment models. Robust trust establishment models, such as the Integrated Trust Establishment (ITE) model, may use dynamically updated variables to adjust the predicted importance of a task’s criteria for specific trustors. This thesis proposes a cluster-based approach to update these dynamic variables more accurately to achieve improved trust establishment performance. Rather than sharing these dynamic variables globally, a model can learn to adjust a trustee’s behaviours more accurately to trustor needs by storing the variables locally for each trustor and by updating groups of these variables together by using data from a corresponding group of similar trustors. This work also presents a generalized trust establishment model architecture to help models be easier to design and be more modular. This architecture introduces a new transaction-level preprocessing module to help improve a model’s performance and defines a trustor-level postprocessing module to encapsulate the designs of existing models. The preprocessing module allows a model to fine-tune the resources that an agent will provide during a transaction before it occurs. A trust establishment model, named the Generalized Trust Establishment Model (GTEM), is designed to showcase the benefits of using the preprocessing module. Simulated comparisons between a cluster-based version of ITE and ITE indicate that the cluster-based approach helps trustees better meet the expectations of trustors while minimizing the cost of doing so. Comparing GTEM to itself without the preprocessing module and to two existing models in simulated tests exhibits that the preprocessing module improves a trustee’s trustworthiness and better meets trustor desires at a faster rate than without using preprocessing.
APA, Harvard, Vancouver, ISO, and other styles
10

Wagner, Alan Richard. "The role of trust and relationships in human-robot social interaction." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31776.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010.
Committee Chair: Arkin, Ronald C.; Committee Member: Christensen, Henrik I.; Committee Member: Fisk, Arthur D.; Committee Member: Ram, Ashwin; Committee Member: Thomaz, Andrea. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
11

Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006.
Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
12

Steinke, Frederick. "Influence of trust in Ambient Assisted Living technologies." Doctoral thesis, Humboldt-Universität zu Berlin, Lebenswissenschaftliche Fakultät, 2015. http://dx.doi.org/10.18452/17167.

Full text
Abstract:
Zwischenmenschliches Vertrauen spielt in Beziehungen eine wichtige Rolle und beinhaltet die Erwartung, dass auf das Wort des Anderen Verlass ist (Rotter, 1967). Auch im Zusammenhang mit Automation und Mensch-Maschine-Systemen erlangt die Betrachtung von Vertrauen in den vergangenen Jahren immer größere Bedeutung. In den Bereichen automatisierte Fahrzeugsteuerung oder militärische Freund-Feind-Erkennung wurde bereits eine Vielzahl von Erhebungen durchgeführt. Einen Forschungsgegenstand, der bislang jedoch weitestgehend unbeachtet geblieben ist, stellen Heim-Automatisierungen und Unterstützungstechnologien für ältere Personen dar. Die vorliegende Dissertation möchte einen Anstoß für die Forschungsaktivitäten im Kontext von Vertrauen in Ambient Assisted Living (AAL) Systeme geben und gleichzeitig die Möglichkeiten von Unterstützungs-technologien (für beeinträchtigte Personen) im Wohnumfeld aufzeigen. Im Fokus der Untersuchung steht dabei das Vertrauen älterer Personen, als potentielle Endnutzer, in AAL Systeme. Nach Durchführung der Literaturanalyse, wurden mittels einer Fragebogenstudie zunächst verschiedene Einflussfaktoren auf das Vertrauen in AAL sowie die Nutzungsabsicht der senioren Zielgruppe erforscht. Unter Einbeziehung der Variablen des Technology Acceptance Modells (TAM) (Davis, 1989) werden Personen mit und ohne täglichem Unterstützungsbedarf befragt. Basierend auf den dadurch gewonnenen Erkenntnissen wurden zwei Experimente durchgeführt. Die Probanden der beiden Experimente, die jeweils eine seniore Testgruppe und eine junge Kontrollgruppe umfassten, sollten mittels eines Mock-Ups auf einem Tablet-Computer verschiedene Aufgaben im Wohnumfeld bearbeiten. Im ersten Experiment wurde zusätzlich zu der Standard-Bedienoberfläche der AAL Technologie, entweder persönliche Unterstützung via Operateur oder eine technische Unterstützung zur Verfügung gestellt. Das zweite Experiment untersuchte drei unterschiedliche Stufen von Zuverlässigkeit einer AAL Applikation.
Interpersonal trust as “expectancy that the verbal statements of others can be relied upon” (Rotter, 1967; p. 651) plays an important role in human relationships. But even in the context of automation and man-machine systems, the consideration of trust has acquired even greater importance in recent years. In the field of automated vehicle control systems or military friend-or-foe recognition, a large number of surveys relating to trust have been conducted. An area of research that, to date, has not been well-investigated is home automation, such as smart home and assistive technologies for older people. The present thesis aims to initiate such research activities in the context of trust in Ambient Assisted Living (AAL) systems, as well as to demonstrate the opportunities that assistive technologies present for impaired persons in the living environment. The focus of the present survey is on the trust of older people, as potential end-users, in AAL systems. To establish an understanding of the state of this research field, a literature review has been conducted. Subsequently, the various factors influencing trust in AAL and usage intention of the elderly target group are examined via a written questionnaire study. Taking into account the variables of the Technology Acceptance Model (TAM) (Davis, 1989), persons with and without need for daily support are interviewed. Based on the obtained results, two subsequent experiments were carried out. The participants in the two experiments, each including a senior test group and a young control group, worked on various tasks through a mock-up on a tablet-computer in the living environment. In the first experiment, in addition to the standard user interface of the AAL technology, either personal support via operator or a technical embedded support was provided to test the differential impact on the trust of the participants in AAL. The second experiment included three different levels of reliability of an AAL application.
APA, Harvard, Vancouver, ISO, and other styles
13

Kennedy, Kendra Ann. "Should I Trust my Car? A Safety Perspective on Human-machine Interactions for Semi-autonomous Vehicles using Virtual Reality." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2564.

Full text
Abstract:
With the increasingly rapid adoption of vehicles with autonomous features, concerns over human driver and passenger safety in such vehicles have greatly increased, especially in regards to autonomous driving features such as Tesla’s Autopilot. In order to improve current
APA, Harvard, Vancouver, ISO, and other styles
14

Souilah, Issam. "Provenance in distributed systems : a process algebraic study of provenance management and its role in establishing trust in data quality." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/353288/.

Full text
Abstract:
We aim to develop a formal framework to reason about provenance in distributed systems. We take as our starting point an extension of the asynchronous pi-calculus where processes are explicitly assigned principal identities. We enrich this basic setting with provenance annotated data, dynamic provenance tracking and dynamically checked trust policies. We give several examples to illustrate the use of the calculus in modelling systems where principals base their trust in the quality of data on the provenance information associated with it. We consider the role of provenance in the calculus by relating the provenance tracking semantics to a plain one in which no provenance tracking or checking takes place. We further substantiate this by studying bisimulation-based behavioural equivalences for the plain and annotated versions of the calculus and contrasting the discriminating power of the equivalences obtained in each case. We also give a more denotational take on the semantics of the provenance calculus and look at notions of well-formedness and soundness for the provenance tracking semantics. We consider two different extensions of the basic calculus. The first aims to alleviate the cost of run time provenance tracking and checking by defining a static type system which guarantees that in well-typed systems principals always receive data with provenance that matches their requirements. The second extension looks at the ramifications of provenance tracking on privacy and security policies and consists of extending the calculus with a notion we call filters. This gives principals the ability to assign different views of the provenance of a given value to different principals, thus allowing for the selective disclosure of provenance information. We study behavioural equivalences for this extension of the calculus, paying particular attention to the set of principals composing the observer and its role in discriminating between systems.
APA, Harvard, Vancouver, ISO, and other styles
15

Kambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.

Full text
Abstract:
There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific user account etc. If this behavior is captured and compared with normal users? behavior, anomalies can be detected. In our model, we have identified malicious users and have assigned trust value to each user accessing the system. When a user accesses new files on the servers that have not been previously accessed, accessing multiple accounts from the same device etc., these users are considered suspicious. If this behavior continues, they are categorized as ingenuine. A trust value is assigned to users. This value determines the trustworthiness of a user. Genuine users get higher trust value and ingenuine users get a lower trust value. The range of trust value varies from zero to one, with one being the highest trustworthiness and zero being the lowest. In our model, we have sixteen different features to track user behavior. These features evaluate users? activities. From the time users? log in to the system till they log out, users are monitored based on these sixteen features. These features determine whether the user is malicious. For instance, features such as accessing too many accounts, using proxy servers, too many incorrect logins attribute to suspicious activity. Higher the number of these features, more suspicious is the user. More such additional features contribute to lower trust value. Identifying malicious users could prevent and/or mitigate the attacks. This will enable in taking timely action against these users from performing any unauthorized or illegal actions. This could prevent insider and masquerade attacks. This application could be utilized in mobile, cloud and pervasive computing platforms.
APA, Harvard, Vancouver, ISO, and other styles
16

Akgoz, Asli. "Optimal Design Of Truss Structures With Actuators." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12605613/index.pdf.

Full text
Abstract:
Smart structures become highly popular with the developing technology. The aim of this study is to develop a basic model, which can be also used in the design of more complex systems by performing simultaneous optimization of a structure and associated controller with respect to some design parameters and feedback gains. In this thesis work, two smart structures are used as case studies and their results are compared with the available results in the literature. The first case study is simple twobar truss problem controlled by either one or two actuators. This problem is solved both numerically and analytically. The latter is a twenty-element parabolic truss, which is controlled by four actuators. This problem is solved numerically only. In the optimization process, the design parameters are taken as the cross sectional areas of bar elements, positions and/or number of actuators, and the elements of closed loop gain matrix. In the second case study, in addition to these parameters, shape design parameters are also optimized. A coordinate transformation is applied in both cases from the displacement space to the modal space. The modal model reduction method is used in the design of second problem. The optimization goal in both cases studies is to minimize the system energy while satisfying some frequency and mass constraints. In the second case study, in addition to the original objective function, system controllability and stability robustness are also maximized. In the solution of design problem, two optimization algorithms are used one embedded within the other. In the outer loop, a hide and seek simulated annealing algorithm optimizes structural design parameters, and positions and/or number of actuators. In order to generate a candidate design family for this level, optimal closed loop gain matrices are calculated by using MATLAB®
.
APA, Harvard, Vancouver, ISO, and other styles
17

Shen, Fangjun. "A computational model of mutual trust between the user and his agent acting on his behalf." Thèse, Chicoutimi : Montréal : Université du Québec à Chicoutimi ;. Université du Québec à Montréal, 2004. http://theses.uqac.ca.

Full text
Abstract:
Thèse (M.Inf.) -- Université du Québec à Chicoutimi, programme extensionné de l'Université du Québec à Montréal, 2004.
Bibliogr.: f. [109]-117. Document électronique également accessible en format PDF. CaQCU
APA, Harvard, Vancouver, ISO, and other styles
18

Shmilovits, Liron. "Deus ex machina : legal fictions in private law." Thesis, University of Cambridge, 2019. https://www.repository.cam.ac.uk/handle/1810/286225.

Full text
Abstract:
This PhD dissertation is about legal fictions in private law. A legal fiction, broadly, is a false assumption knowingly relied upon by the courts. The main aim of the dissertation is to formulate a test for which fictions should be accepted and which rejected. Subsidiary aims include a better understanding of the fiction as a device and of certain individual fictions, past and present. This research is undertaken, primarily, to establish a rigorous system for the treatment of fictions in English law - which is lacking. Secondarily, it is intended to settle some intractable disputes, which have plagued the scholarship. These theoretical debates have hindered progress on the practical matters which affect litigants in the real world. The dissertation is divided into four chapters. The first chapter is a historical study of common-law fictions. The conclusions drawn thereform are the foundation of the acceptance test for fictions. The second chapter deals with the theoretical problems surrounding the fiction. Chiefly, it seeks precisely to define 'legal fiction', a recurrent problem in the literature. A solution, in the form of a two-pronged definition, is proposed, adding an important element to the acceptance test. The third chapter analyses modern-day fictions and recommends retention or abolition for each fiction. In the fourth chapter, the findings hitherto are synthesised into a general acceptance test for fictions. This test, which is the thesis of this work, is presented as a flowchart. It is the author's hope that this project will raise awareness as to the merits and demerits of legal fictions, de-mystify the debate and bring about reform.
APA, Harvard, Vancouver, ISO, and other styles
19

Buchmann, Nicolas [Verfasser]. "Strengthening trust in the identity life cycle : Enhancing electronic machine readable travel documents due to advances in security protocols and infrastructure / Nicolas Buchmann." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1180387961/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Basantis, Alexis Rae. "Assessing Alternate Approaches for Conveying Automated Vehicle Intentions." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/95219.

Full text
Abstract:
Objectives: Research suggests the general public has a lack of faith in highly automated vehicles (HAV) stems from a lack of system transparency while in motion (e.g., the user not being informed on roadway perception or anticipated responses of the car in certain situations). This problem is particularly prevalent in public transit or ridesharing applications, where HAVs are expected to debut, and when the user has minimal training on, and control over, the vehicle. To improve user trust and their perception of comfort and safety, this study aimed to develop more detailed and tailored human-machine interfaces (HMI) aimed at relying automated vehicle intended actions (i.e., "intentions") and perceptions of the driving environment to the user. Methods: This project developed HMI systems, with a focus on visual and auditory displays, and implemented them into a HAV developed at the Virginia Tech Transportation Institute (VTTI). Volunteer participants were invited to the Smart Roads at VTTI to experience these systems in real-world driving scenarios, especially ones typically found in rideshare or public transit operations. Participant responses and opinions about the HMIs and their perceived levels of comfort, safety, trust, and situational awareness were captured via paper-based surveys administered during experimentation. Results: There was a considerable link found between HMI modality and users' reported levels of comfort, safety, trust, and situational awareness during experimentation. In addition, there were several key behavioral factors that made users more or less likely to feel comfortable in the HAV. Conclusions: Moving forward, it will be necessary for HAVs to provide ample feedback to users in an effort to increase system transparency and understanding. Feedback should consistently and accurately represent the driving landscape and clearly communicate vehicle states to users.
Master of Science
One of the greatest barriers to the entry of highly automated vehicles (HAV) into the market is the lack of user trust in the vehicle. Research has shown that this lack of faith in the system primarily stems from a lack of system transparency while in motion (e.g., the user not being told how the car will react in a certain situation) and not having an effective way to control the vehicle in the event of a system failure. This problem is particularly prevalent in public transit or ridesharing applications, where HAVs are expected to first appear and where the user has less training and control over the vehicle. To improve user trust and perceptions of comfort and safety, this study developed human-machine interface (HMI) systems, focusing on visual and auditory displays, to better relay automated vehicle "intentions" and the perceived driving environment to the user. These HMI systems were then implemented into a HAV developed at the Virginia Tech Transportation Institute (VTTI) and tested with volunteer participants on the Smart Roads.
APA, Harvard, Vancouver, ISO, and other styles
21

Sloberg, Hanna, and Sara Nilsson. "Internal Marketing Communication : Alpha, a Machinery Business." Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-73548.

Full text
Abstract:
The aim of this study is to investigate the effectiveness of the internal communication, as a dimension of internal marketing, in a global multicultural company. The study was based on a conceptual model that is a miscellany of theoretical concepts of how to create effective internal marketing communication for global organizations. Through the investigation of the company referred to as Alpha, a quantitative study across six countries was conducted to further the knowledge on how to address the needs of internal customers and adjust the internal marketing strategy thereafter. A questionnaire was sent to a random sample, with a response rate of 215 employees that together reflected the total population of 2831. Through the usage of ANOVAs, the findings displayed significant differences of how the employees in all countries perceived the internal communication at Alpha. The study also compared differences within two countries where there was enough data to investigate differences between categories of employees, these results were not significant. In general, it can be said that the results were grouped by the differences of the three European countries against the three non-European countries. Another prominent finding was that China was separated from the other countries, this was also the instance collectively shown for Sweden and Finland as they were often grouped together. The implications are that possible differences in business culture may have affected these results, which further studies need to investigate. The results jointly report that the internal customers are not satisfied with the internal communication. The conclusion is that the needs of the employees at Alpha should be addressed much further, as a part of the company internal marketing communication strategy.
APA, Harvard, Vancouver, ISO, and other styles
22

Ekman, Viktor, Sulaimon Imamov, and Stsiapan Klouchkou. "Managing business-to-business relationships between Swedish and Russian SMEs in the Russian market." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35998.

Full text
Abstract:
In recent times the Russian market has been exposed to significant changes, both in the challenges of the transition from planned to market economy as well as the opportunities that has spurred a willingness for foreign companies to exploit the vast potential of the market. The aim of this thesis is to explore how business relationships are managed between Swedish business-to-business(B2B) SMEs and Russian counterparts. In our study we overview Swedish companies which are well established on the Russian market and have well-developed relationships with their representatives in Russia and try to discover which aspects of their relations is decisive for the success of the companies. To conduct our research we created reseach questions "What role do business relationships play between Swedish and Russian SMEs in the Russian market?, and how are the business relationships managed?". We collected data from both Swedish and Russian perspectives to determine the main features of their relations and draw up guidance for potential Western newcomers to Russia.
APA, Harvard, Vancouver, ISO, and other styles
23

Dang, Quang Vinh. "Évaluation de la confiance dans la collaboration à large échelle." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0002/document.

Full text
Abstract:
Les systèmes collaboratifs à large échelle, où un grand nombre d’utilisateurs collaborent pour réaliser une tâche partagée, attirent beaucoup l’attention des milieux industriels et académiques. Bien que la confiance soit un facteur primordial pour le succès d’une telle collaboration, il est difficile pour les utilisateurs finaux d’évaluer manuellement le niveau de confiance envers chaque partenaire. Dans cette thèse, nous étudions le problème de l’évaluation de la confiance et cherchons à concevoir un modèle de confiance informatique dédiés aux systèmes collaboratifs. Nos travaux s’organisent autour des trois questions de recherche suivantes. 1. Quel est l’effet du déploiement d’un modèle de confiance et de la représentation aux utilisateurs des scores obtenus pour chaque partenaire ? Nous avons conçu et organisé une expérience utilisateur basée sur le jeu de confiance qui est un protocole d’échange d’argent en environnement contrôlé dans lequel nous avons introduit des notes de confiance pour les utilisateurs. L’analyse détaillée du comportement des utilisateurs montre que: (i) la présentation d’un score de confiance aux utilisateurs encourage la collaboration entre eux de manière significative, et ce, à un niveau similaire à celui de l’affichage du surnom des participants, et (ii) les utilisateurs se conforment au score de confiance dans leur prise de décision concernant l’échange monétaire. Les résultats suggèrent donc qu’un modèle de confiance peut être déployé dans les systèmes collaboratifs afin d’assister les utilisateurs. 2. Comment calculer le score de confiance entre des utilisateurs qui ont déjà collaboré ? Nous avons conçu un modèle de confiance pour les jeux de confiance répétés qui calcule les scores de confiance des utilisateurs en fonction de leur comportement passé. Nous avons validé notre modèle de confiance en relativement à: (i) des données simulées, (ii) de l’opinion humaine et (iii) des données expérimentales réelles. Nous avons appliqué notre modèle de confiance à Wikipédia en utilisant la qualité des articles de Wikipédia comme mesure de contribution. Nous avons proposé trois algorithmes d’apprentissage automatique pour évaluer la qualité des articles de Wikipédia: l’un est basé sur une forêt d’arbres décisionnels tandis que les deux autres sont basés sur des méthodes d’apprentissage profond. 3. Comment prédire la relation de confiance entre des utilisateurs qui n’ont pas encore interagi ? Etant donné un réseau dans lequel les liens représentent les relations de confiance/défiance entre utilisateurs, nous cherchons à prévoir les relations futures. Nous avons proposé un algorithme qui prend en compte les informations temporelles relatives à l’établissement des liens dans le réseau pour prédire la relation future de confiance/défiance des utilisateurs. L’algorithme proposé surpasse les approches de la littérature pour des jeux de données réels provenant de réseaux sociaux dirigés et signés
Large-scale collaborative systems wherein a large number of users collaborate to perform a shared task attract a lot of attention from both academic and industry. Trust is an important factor for the success of a large-scale collaboration. It is difficult for end-users to manually assess the trust level of each partner in this collaboration. We study the trust assessment problem and aim to design a computational trust model for collaborative systems. We focused on three research questions. 1. What is the effect of deploying a trust model and showing trust scores of partners to users? We designed and organized a user-experiment based on trust game, a well-known money-exchange lab-control protocol, wherein we introduced user trust scores. Our comprehensive analysis on user behavior proved that: (i) showing trust score to users encourages collaboration between them significantly at a similar level with showing nick- name, and (ii) users follow the trust score in decision-making. The results suggest that a trust model can be deployed in collaborative systems to assist users. 2. How to calculate trust score between users that experienced a collaboration? We designed a trust model for repeated trust game that computes user trust scores based on their past behavior. We validated our trust model against: (i) simulated data, (ii) human opinion, and (iii) real-world experimental data. We extended our trust model to Wikipedia based on user contributions to the quality of the edited Wikipedia articles. We proposed three machine learning approaches to assess the quality of Wikipedia articles: the first one based on random forest with manually-designed features while the other two ones based on deep learning methods. 3. How to predict trust relation between users that did not interact in the past? Given a network in which the links represent the trust/distrust relations between users, we aim to predict future relations. We proposed an algorithm that takes into account the established time information of the links in the network to predict future user trust/distrust relationships. Our algorithm outperforms state-of-the-art approaches on real-world signed directed social network datasets
APA, Harvard, Vancouver, ISO, and other styles
24

Wilkison, Bart D. "Effects of mental model quality on collaborative system performance." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Payre, William. "Conduite complètement automatisée : acceptabilité, confiance et apprentissage de la reprise de contrôle manuel." Thesis, Paris 8, 2015. http://www.theses.fr/2015PA080115/document.

Full text
Abstract:
Des voitures complètement automatisées pourraient circuler sur les routes dans les décennies à venir. Elles permettraient aux automobilistes d’être conduits dans leur véhicule par un système informatique. Une telle innovation pourrait engendrer une révolution qui affecterait le rôle du conducteur et ses activités pendant le trajet. Actuellement, ces véhicules ne sont pas encore accessibles au grand public, et il demeure difficile de prédire précisément quand cela se produira, et quelles seront leurs caractéristiques techniques finales. Dans ce contexte, un des objectifs de cette thèse a été d’étudier dans quelle mesure la conduite complètement automatisée sera acceptée. Bien que l’automobiliste soit conduit par son véhicule, il pourrait être amené à en reprendre le contrôle manuel dans différentes circonstances. En effet, cette manœuvre pourrait être effectuée en situation d’urgence ou de manière anticipée par le conducteur alors qu’il pourrait être engagé dans une autre activité que la conduite. La réalisation de cette reprise de contrôle manuel pourrait être plus ou moins difficile selon la situation et l’expérience d’interactions avec le système complètement automatisé. Nous avons examiné la manière dont cette manœuvre pourrait être apprise par des conducteurs, en testant l’effet de différentes formes d’entrainement sur la performance et la sécurité (temps de réponse et qualité de la reprise de contrôle). L’acceptabilité et la confiance, les attitudes des conducteurs, les intentions d’utilisation du système de conduite complètement automatisée et l’impact de ces variables sur les comportements dans le véhicule ont été mesurés
Fully automated cars could possibly be on the road in the decades to come. They will allow drivers to be driven by an informatics system in their own vehicle. Such an innovation could lead to a revolution that would change the driver’s status and its activities during the trips, but also the infrastructure, freight, some professions, etc. Nowadays, these vehicles are not available for sale yet, and it is difficult to forecast accurately when they will be, and also what their features will be. Considering this, one of the aims of the present thesis is to examine to what extend fully automated driving will be accepted. Even though the driver is driven by its vehicle, he could have to resume manual control in different circumstances. Indeed, this maneuver could be performed in an emergency or in an anticipated situation while he could be engaged in a non driving-related activity. Performing a manual control recovery could be more or less difficult according to the situation and the experience with the fully automated system. The way this maneuver could be learned by drivers has been examined, testing the impact of different kinds of training on performance and safety (response time and control recovery quality). Acceptability, trust, drivers’ attitudes, intentions to use the fully automated driving system and the impact of these variables on behaviors inside the vehicle have been assessed
APA, Harvard, Vancouver, ISO, and other styles
26

Frössling, Jacob, and Tobias Eiman. "Granskning av en Internet of Things-implementering mot industri 4.0 : Från konsultbyråns, beställarens och användarens perspektiv." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76283.

Full text
Abstract:
The first industrial revolution moved from farming to factory through the development ofthe steam engine. The Second arose through the innovation of electricity and the thirdindustrial revolution moved from analogue technology to digital technology. The latestindustry trend is called industry 4.0, whose vision is to create automated factories. Industry4.0 refers to create smart factories, where physical objects may communicate with eachother to solve different kind of problems. This new technology entails different changes forcompanies, there among other things; the role of human beings will be affected in one oranother way.This thesis has examined an industrial company, which strives to develop their businesstowards industry 4.0. The purpose of the study was to review an ongoing implementationof IoT, focusing on understanding different actors' perspectives on the emerging technology.On this basis several of possibilities and difficulties were identified, which companies needto consider in the future when developing towards industry 4.0.The result of the study describes the difference between different actors' perspectives, whichin the future will have to be discussed in order to find a balance in the IoT-environment. Byexamining an ongoing implementation of IoT, a checklist consisting of key componentswere identified. This checklist may be useful for companies with
Den första industriella revolutionen uppkom vid ångmaskinens framgång, den andra genomelektricitet och den tredje utvecklades med hjälp av IT. Den senaste trenden inom industrinkallas Industri 4.0, vars vision syftar till att skapa automatiserade fabriker. Den nya teknikenkommer inte att utvecklas över en natt och det finns ett flertal faktorer vilka behöverundersökas för att lyckas ta stegen mot visionen. Industri 4.0 medför olika förändringar förföretagen där bland annat människans roll inom verksamheten kommer att påverkas.Studien har genomförts mot ett medelstort industriföretag, vilket strävar efter att utvecklasin verksamhet mot industri 4.0. Författarna har tidigare samarbetat med industriföretagetoch konsultbyrån. Tillsammans utvecklar de en plattform mot Internet of Things (IoT) föratt ta första steget mot en uppkopplad verksamhet. Syftet med studien var att granska enpågående implementering av IoT med fokus på att förstå olika aktörers perspektiv på denframväxande tekniken. Med den utgångspunkten identifierades olika möjligheter ochproblem företagen kommer att behöva ta hänsyn till.Studiens resultat belyser skillnaden mellan olika aktörers perspektiv vilket i framtidenkommer att behöva diskuteras för att hitta en balans. Eftersom studien granskade enpågående implementering identifierades dessutom ett arbetssätt bestående av viktigakomponenter för företag med visionen att börja utveckla sin verksamhet mot industri 4.0visionen.
APA, Harvard, Vancouver, ISO, and other styles
27

Chiluvuri, Nayana Teja. "A Trusted Autonomic Architecture to Safeguard Cyber-Physical Control Leaf Nodes and Protect Process Integrity." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/56572.

Full text
Abstract:
Cyber-physical systems are networked through IT infrastructure and susceptible to malware. Threats targeting process control are much more safety-critical than traditional computing systems since they jeopardize the integrity of physical infrastructure. Existing defence mechanisms address security at the network nodes but do not protect the physical infrastructure if network integrity is compromised. An interface guardian architecture is implemented on cyber-physical control leaf nodes to maintain process integrity by enforcing high-level safety and stability policies. Preemptive detection schemes are implemented to monitor process behavior and anticipate malicious activity before process safety and stability are compromised. Autonomic properties are employed to automatically protect process integrity by initiating switch-over to a verified backup controller. Subsystems adhere to strict trust requirements safeguarding them from adversarial intrusion. The preemptive detection schemes, switch-over logic, backup controller, and process communication are all trusted components that are separated from the untrusted production controller. The proposed architecture is applied to a rotary inverted pendulum experiment and implemented on a Xilinx Zynq-7000 configurable SoC. The leaf node implementation is integrated into a cyber-physical control topology. Simulated attack scenarios show strengthened resilience to both network integrity and reconfiguration attacks. Threats attempting to disrupt process behavior are successfully thwarted by having a backup controller maintain process stability. The system ensures both safety and liveness properties even under adversarial conditions.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
28

Sokol, David. "Bytový dům v Blansku - stavebně technologický projekt." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2018. http://www.nusl.cz/ntk/nusl-372184.

Full text
Abstract:
The content of this work is the elaboration of a technology-oriented project for the construction of an apartment building with four above-ground floors in Blansko. This project includes a technical report, road mapping solutions, technological regulations, a drawing and technical report of the building site equipment, a timetable, a design of the machine assembly, control and test plans, a material resource assurance plan, and a technical report on health and safety at the building site.
APA, Harvard, Vancouver, ISO, and other styles
29

Negrão, Catarina Saraiva Marreiros. "A influência da inteligência artificial na criação de valor nos processos de negócio das organizações." Master's thesis, Instituto Superior de Economia e Gestão, 2019. http://hdl.handle.net/10400.5/19612.

Full text
Abstract:
Mestrado em Marketing
É evidente a crescente inovação tecnológica e a necessidade das empresas de se adaptar e integrar nos seus negócios estas tecnologias avançadas. A crescente evolução da Inteligência Artificial (IA) tem alterado a forma como as empresas interagem e realizam os seus negócios. Com a integração de sistemas de IA no contexto empresarial, é de interesse compreender qual a sua influência nos relacionamentos Business - to - Business (B2B), no que respeita à criação de valor nos negócios das organizações. A presente investigação tem como objetivo averiguar a influência da utilização de inteligência artificial na criação de valor nos processos de negócio das organizações nos que foram considerados fatores críticos de sucesso num negócio tais como a confiança, a qualidade na prestação de um serviço, a otimização de processos, o tempo de resposta ao cliente e os custos organizacionais.
The growing technological innovation and the need for companies to adapt and integrate these advanced technologies into their business is evident. The growing evolution of Artificial Intelligence (AI) has changed the way companies interact and conduct their business. With the integration of AI systems into the business context, it is of interest to understand how they influence Business - to - Business (B2B) relationships in terms of creating business value for organizations. This research aims to investigate the influence of the use of artificial intelligence on the creation of value in the business processes of organizations in what were considered critical success factors in a business such as trust, quality in service provision, optimization of processes, customer response time, and organizational costs.
info:eu-repo/semantics/publishedVersion
APA, Harvard, Vancouver, ISO, and other styles
30

Mellberg, Amanda, and Emma Skog. "Artificiell Intelligens inom rekryteringsprocessen : objektivitet med subjektiv data?" Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-15078.

Full text
Abstract:
Artificiell Intelligens (AI) har flera användningsområden som bland annat robotik, ansiktsigenkänning och stöd vid beslutsfattande. Organisationer kommer använda AI mer för att möta utmaningar inom Human Resources (HR) de närmaste fem åren vilket pekar på att AI sannolikt kommer bli en vanligare förekomst inom rekryteringsprocessen. En av de viktigaste tillgångarna i ett företag är dess anställda och felaktiga rekryteringar kan komma att medföra stora kostnader. Med maskininlärning och AI-system som beslutsfattare kan det vara av vikt att fundera på vad det är för data som dessa system förses med då en av riskerna med maskininlärning inom AI är att man inte vet vad maskinerna lär sig när den lär sig själv. En större datamängd behöver i sig inte medföra mer subjektiva resultat men risken att direkt koda in diskriminering finns fortfarande eftersom den data AI-system förses med i sig kan innehålla bias. Det har även visat sig att kandidater inte vill bli bedömda på politiska åsikter, relationer eller annat som kan tas fram via big data och data mining. Syftet med studien är att skapa en djupare förståelse för vad som behövs för att automatisera rekryteringsprocessen med hjälp av AI och maskininlärning samt till att utforma en lista på hur AI kan vara ett stöd för företag att ha i åtanke vid en möjlig implementering. Till studien har tre metoder till empiriinsamling valts ut varav samtliga med en kvalitativ ansats. Intervjuer och en enkät har samlat in de data som analyserats i Excel 2016 samt Google Docs. Intervjuerna utfördes i flera skeden och riktade sig mot två anställda på varsitt rekryteringsföretag. Enkäten riktade sig främst till individer som kommer att ta/har tagit examen inom det närmaste året. Urvalet har skett enligt studiens syfte och vid enstaka tillfällen har ett bekvämlighetsurval gjorts. Resultatet visar att rekryterarna lägger mycket tid på att screena kandidater och gör det manuellt. Enkäten visar att kommande kandidater främst är neutrala i sin tillit till att screening utförs av ett AI-system. Respondenten i uppföljningsintervjun säger att en automatisering med AI hade underlättat arbetet och håller med det enkätrespondenterna anser om fördelar och nackdelar med AI men skulle samtidigt inte lita på resultatet. Vidare tror respondenten att det är den automatiserade vägen rekryteringsprocessen kommer att gå. Resultatet av studien kan komma att nyttjas av rekryteringsföretag som funderar på att införa AI i sina rekryteringsprocesser.
Artificial Intelligence (AI) has several areas of use such as robotics, facial recognition and decision-making support. Organizations will use AI more to meet challenges within Human Resources (HR) over the next five years, indicating that AI is likely to become a more common occurrence in the recruitment process. One of the most important assets of a company is its employees and incorrect recruitments can lead to high costs. With machine learning and AI systems as decision makers it may be important to think about what data is provided to these systems, since one of the risks of machine learning within AI is that you do not know what the machines learn as they learn themselves. A larger amount of data does not necessarily lead to more subjective results, but the risk of directly encode discrimination still exists because of the data the AI system is provided with can contain bias. It has also been found that candidates do not want to be judged on political views, relationships or anything that can be gained through big data and data mining. The purpose of the study is to provide a deeper understanding of what is needed to automate the recruitment process using AI and machine learning and to design a list of how AI can be a support for companies to keep in mind during a possible implementation. The study has chosen three methods for empirical gathering, all of which are qualitative. Interviews and a survey has collected the data which is analyzed in Excel 2016 as well as Google Docs. The interviews were conducted in several stages and aimed towards two employees working at two different recruiting companies. The survey was aimed primarily towards individuals who will have graduated within this year. The selection of participants has been made for the purpose of the study and on some occasions a comfort selection has been made. The result shows that the recruiters spend a lot of time screening candidates and do this manually. The survey shows that future candidates have a neutral stance when it comes to trusting in an AI system performing the screening process. The respondent in the follow-up interview says that automation using AI would facilitate the work and agrees with the survey respondents considering the pros and cons of AI, but at the same time would not rely on the results. Further, the respondent believes that it is in the automated way the recruitment process will continue. The result of the study may be used by recruitment companies that are considering introducing AI into their recruitment processes.
APA, Harvard, Vancouver, ISO, and other styles
31

Guerriero, Annie. "La représentation de la confiance dans l'activité collective Application à la coordination de l'activité de chantier de construction." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00558823.

Full text
Abstract:
Les spécificités du secteur de la construction engendrent un contexte de travail coopératif que nous pouvons qualifier d'incertain par nature. L'activité de chantier se caractérise par un mode de production in situ. Dès lors, nombreux sont les dysfonctionnements qui peuvent apparaître. Nous citerons, par exemple, les problèmes liés à la nature du sol, aux intempéries ou encore ceux qui sont propres aux interactions entre les intervenants (ex. fourniture en matériaux, interfaces entre les corps de métier...). Aussi, la coordination repose sur un mélange subtil entre interactions implicites et explicites, où l'organisation prend de multiples configurations (hiérarchique, adhocratique ou transversale), et où la qualité du processus collectif repose sur l'autonomie et le sens des responsabilités de chacun des intervenants. Nous faisons l'hypothèse qu'un tel contexte est largement fondé sur la notion de confiance, car celle-ci a la capacité de réduire la perception du risque et de permettre l'action dans un environnement marqué par de nombreuses incertitudes. En conséquence, nous suggérons un rapprochement entre les outils d'assistance à la coordination et la notion de confiance, et nous proposons une nouvelle approche du pilotage de l'activité collective à partir de la représentation de la confiance. Ce travail de doctorat se structure autour de la notion de «confiance dans le bon déroulement de l'activité». Nous suggérons que celle-ci est dépendante de chacune des dimensions de l'activité collective : sa progression, les acteurs chargés de son exécution, les ouvrages en résultant (et leur difficulté de mise en œuvre), ainsi que les documents nécessaires à sa réalisation. Aussi, notre méthode consiste d'abord en l'identification des divers critères de confiance, consolidés par une étude de terrain. Puis, nous établissons un modèle mathématique destiné à évaluer cette confiance à partir des informations issues d'un contexte de coopération. Sur base de ces éléments, s'en suit la proposition d'un prototype dénommé Bat'iTrust, reposant sur une architecture logicielle multi-vues et orientée services. Pour l'utilisateur, la navigation au sein de ce prototype est guidée par un tableau de bord centré sur le concept de confiance. Enfin, la validation de cette proposition repose sur des enquêtes et une phase d'expérimentation qui nous ont permis de confronter nos résultats à des sujets expérimentaux représentatifs du domaine.
APA, Harvard, Vancouver, ISO, and other styles
32

Vyoral, Martin. "Stavebně technologický projekt administrativní budovy ve Zlíně-Lukové." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2015. http://www.nusl.cz/ntk/nusl-227272.

Full text
Abstract:
In this thesis is solved by building technological project of an office building in Zlin Januška Compressors - Lukov focusing on selected technological stage. Namely, the implementation of large wooden roof trusses and performing thermal insulation composite system. For these technological steps are processing all documents that are necessary for their implementation. It's technical report on construction technology project, time and financial plan of the building, study the implementation of major technological stages of the main building structure, design of the main building mechanisms, the project site equipment with appropriate drawings and calculations of the costs of site, technical regulations implementing the activities related to monitoring and test plans.
APA, Harvard, Vancouver, ISO, and other styles
33

Pozler, Tomáš. "Stavebně technologický projekt pro hotel v Krkonoších." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2020. http://www.nusl.cz/ntk/nusl-409940.

Full text
Abstract:
This diploma thesis solves processing of documents for realization of hotel construction in Špindlerův Mlýn. The work contains technical report, coordination situation, time and financial plan of construction, construction technology study, project of construction site equipment, design of construction machinery, plan of material resources, technological regulation for truss realization, plumbing and roofing, control and testing plan protection of health at work, playground project.
APA, Harvard, Vancouver, ISO, and other styles
34

"Attribution Biases and Trust Development in Physical Human-Machine Coordination: Blaming Yourself, Your Partner or an Unexpected Event." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53677.

Full text
Abstract:
abstract: Reading partners’ actions correctly is essential for successful coordination, but interpretation does not always reflect reality. Attribution biases, such as self-serving and correspondence biases, lead people to misinterpret their partners’ actions and falsely assign blame after an unexpected event. These biases thus further influence people’s trust in their partners, including machine partners. The increasing capabilities and complexity of machines allow them to work physically with humans. However, their improvements may interfere with the accuracy for people to calibrate trust in machines and their capabilities, which requires an understanding of attribution biases’ effect on human-machine coordination. Specifically, the current thesis explores how the development of trust in a partner is influenced by attribution biases and people’s assignment of blame for a negative outcome. This study can also suggest how a machine partner should be designed to react to environmental disturbances and report the appropriate level of information about external conditions.
Dissertation/Thesis
Masters Thesis Human Systems Engineering 2019
APA, Harvard, Vancouver, ISO, and other styles
35

(8862785), Kumar Akash. "Reimagining Human-Machine Interactions through Trust-Based Feedback." Thesis, 2020.

Find full text
Abstract:
Intelligent machines, and more broadly, intelligent systems, are becoming increasingly common in the everyday lives of humans. Nonetheless, despite significant advancements in automation, human supervision and intervention are still essential in almost all sectors, ranging from manufacturing and transportation to disaster-management and healthcare. These intelligent machines interact and collaborate with humans in a way that demands a greater level of trust between human and machine. While a lack of trust can lead to a human's disuse of automation, over-trust can result in a human trusting a faulty autonomous system which could have negative consequences for the human. Therefore, human trust should be calibrated to optimize these human-machine interactions. This calibration can be achieved by designing human-aware automation that can infer human behavior and respond accordingly in real-time.

In this dissertation, I present a probabilistic framework to model and calibrate a human's trust and workload dynamics during his/her interaction with an intelligent decision-aid system. More specifically, I develop multiple quantitative models of human trust, ranging from a classical state-space model to a classification model based on machine learning techniques. Both models are parameterized using data collected through human-subject experiments. Thereafter, I present a probabilistic dynamic model to capture the dynamics of human trust along with human workload. This model is used to synthesize optimal control policies aimed at improving context-specific performance objectives that vary automation transparency based on human state estimation. I also analyze the coupled interactions between human trust and workload to strengthen the model framework. Finally, I validate the optimal control policies using closed-loop human subject experiments. The proposed framework provides a foundation toward widespread design and implementation of real-time adaptive automation based on human states for use in human-machine interactions.
APA, Harvard, Vancouver, ISO, and other styles
36

CHANG, CHEN-YI, and 張振益. "A Study of Trust Model in Construction Machinery Firm." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/754dev.

Full text
Abstract:
碩士
朝陽科技大學
企業管理系高階產業經營碩士在職專班
108
Construction equipment is Taiwan’s construction industry of development track. Construction equipment --Taiwan has not excavator marker, it depends on import especially Japanese brands. In the past, the business mode is client can’t contact with agent directly. In recent years saw the emergence of many new nations. The variety of brands is in the new machine market. Client and agent have good relationship. So how to get client’s favor and client trust brand become the important point. This is to say “Trust is important for all business”. We hope to get all the influences of Taiwan’s construction industry-trust factor between excavator end user and agent’s sales person through studied documents and case studies. Therefore, we can find the solution to build trust between each other and reach three goals. 1) It is appropriate the evolution of the trust relationship between end user and agent’s sales person in the construction industry of new excavator market. 2) The analysis of capabilities required to establish trust relationship for each stage. 3) According to case study analysis of results, we provide excavator related industry agent reference about the sales model of the best trust of the excavator agent. According to analysis, we found the trust type relevance and developmental pattern. The results show every stage of trust type in previous stage, so the sales actives can be continued. The evolution of sales follows up chronological order. The trust type is from calculated mode (understanding and evaluation stage) to knowledge mode (evaluation and purchase stage) and then identity mode (purchase and repo stage). The finial mode is height trust (repo stage). Second, we studied and found the computational trust mode-based understanding and evaluation stage. The influencing factors are organizational, personal, interactive and product. The required capabilities are business processes, organization and technical capability. The knowledge mode- based evaluation and purchase stage. The influencing factors are organizational, personal, interactive and product. The required capabilities are business processes, organization and technical capability. The identity mode- based purchase and buy back stage. The influencing factors are organizational, personal, interactive and product. The required capabilities are business processes, organization and technical capability. The institution mode- based buy back stage. The influencing factor is interaction. The required capabilities are organization and technical capability. Based on the above conclusions, we provided useful suggestions for customer trust relationship and customer maintenance in excavator industry.
APA, Harvard, Vancouver, ISO, and other styles
37

Hsieh, Jung-Hsuan, and 謝榮軒. "Blockchain-Based Resume: A Prototypical Architecture for Machine-Made Trust in Recruiting." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/rv9264.

Full text
Abstract:
碩士
國立中央大學
資訊管理學系
106
The cost of trust has been a major proportion of the cost in recruitment. These high prices we pay for trust come from the need of information validity and avoiding the greater cost for the wrong decisions we made in recruitment. In the current human resource environment, the trust issue was originated from the lack of information transparency between employers and candidates. Meaning that employers and candidates are unable to determine the authenticity of information provided by both parties accurately, causing poor information quality. Therefore, we need an effective recruitment mechanism to solve this problem. With the invention of blockchain, machine-made trust become possible due to the nature of blockchain such as decentralized, indelible and traceable. Therefore, we established the topic of this study as “How to make sure that all information on a candidates’ application is accurate base on machine-made trust?” This study implemented a prototypically architecture of blockchain-based resume on ethereum. We elaborated a certificate mechanism by smart contract. Certificate provider will send the transaction to smart contract with the hash value of certificate. We can validate the identity of sender because of the traceability of blockchain also verify the integrity of certificate by hash function. The study found that the architecture we built has the potential to change the traditional mechanism radically. It can make any independent individuals, companies and academies to become a certificate unit. Helping us to verify our qualifications, career history, and other career achievements. Providing a more intuitive channel in digital form rather than the format of tradition resume.
APA, Harvard, Vancouver, ISO, and other styles
38

Alnasser, Ali. "An Empirical Study of the Distributed Ellipsoidal Trust Region Method for Large Batch Training." Thesis, 2021. http://hdl.handle.net/10754/667327.

Full text
Abstract:
Neural networks optimizers are dominated by rst-order methods, due to their inexpensive computational cost per iteration. However, it has been shown that rstorder optimization is prone to reaching sharp minima when trained with large batch sizes. As the batch size increases, the statistical stability of the problem increases, a regime that is well suited for second-order optimization methods. In this thesis, we study a distributed ellipsoidal trust region model for neural networks. We use a block diagonal approximation of the Hessian, assigning consecutive layers of the network to each process. We solve in parallel for the update direction of each subset of the parameters. We show that our optimizer is t for large batch training as well as increasing number of processes.
APA, Harvard, Vancouver, ISO, and other styles
39

Persson, Felicia, and Malin Thorslund. "Factors for perceived trust in mobile applications." Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-21037.

Full text
Abstract:
Mobile commerce can be seen as the phenomenon, which is likely to take over e-commerce since purchasing online is increasing on mobile applications (Parameswari, 2015). The problem this study addresses is the uncertainty that may follow when purchasing online via mobile applications. The purpose of this study is to investigate some human and technology factors for perceived trust in mobile applications. Human factors are defined as the same thing as user factors throughout this thesis.   This will answer the research question: What are the most important user and technology factors for perceived trust in mobile applications? The study is limited to two main areas (human and technology factors) that have been broken down into three subgroups based on perceived trust. These subgroups are: informative context for decision-making, ease of use and payment methods.   To gather data, an online self-completion questionnaire was conducted and was sent out to different social groups on Facebook. The participated segmentation resulted in needing to be modified according to uneven response rates in the different age groups. The target group went from the whole Swedish population to only people in the ages span of 16-32. The collected data was processed in the analysis program SPSS to find relations among the variables.   All the chosen factors resulted in being of great importance for users to perceived trust in mobile applications and to increase the interactivity between human and machine. However, only payment methods showed a significant value in relation to perceived trust. This result will be useful to companies when developing mobile applications to keep customers and increase sales.
APA, Harvard, Vancouver, ISO, and other styles
40

TSAI, CHIH-CHAN, and 蔡志展. "A Study on the Progress of Customer Trust Relationship in Tool Machine Industry – The Case of Company A." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/e5gju5.

Full text
Abstract:
碩士
朝陽科技大學
企業管理系
107
The domestic machine tool industry has many features such as a large number of brands but relatively a small market size. Also, since the popularity of the Internet, it is easy for customers to obtain manufacturers and products information. In terms of the characteristics of the machine tool, it is not easy for customers to purchase machines on the website due to the needs of requiring professional sales consultancy. But it is the nature that the online search allows customers to get more information about manufacturers and products data and thus allows the increasing opportunities of choice. Manufacturers and business personnel, in the face of many market competitors along with the slightest threaded difference in product specifications and quality, the mutual trust relationship will be an important key to the success of the transaction. Therefore, it is to understand the factors that affecting trust, establishing a high degree of trust, and thus enhancing the transaction success will be the main issue in the sales of machine tools. Due to the nature of the machine tool that the customers and the manufacturers along with business personnel have the characteristics of frequent and long-term interactions, the research design of this study adopts case study, and the research objective is to adopt the domestic machine tool manufacturer, Victor Taichung Machinery Works Co., Ltd., as a case company. The analysis unit is to understand the relationships between the case company and three customers which are utilized as examples within 15-years- experience of using the case company products. This study conducts “interview method” to study various phases of trust relationships in the machine tool industry. The conclusions of the study indicate that the trust relationship is varied on the basis of different trust phases. The contact, evaluation/first-purchase, use/re-purchase and renewal phases are based on initial trust, calculus-based trust, knowledge-based trust, and identity-based trust respectively. In each trust phase, the foundation of trust varies due to different weighted factors in organization, personnel and products factors. Also, trust relationships in all phases are affected by different relational commitments. The initial trust phase is affected by the commitments of the goodwill from manufacturer and the commitments of product’s best interest having been brought to customers. The calculus-based trust is subjected to the commitments that products meeting the customer's interests so as to the best interest of customer’s own assessment. The knowledge-based trust phase is affected by the commitments of product technical support and service, and the identity-based trust phase is everlasting sustained by the commitments in long-term services. Based on above conclusions, the study constructs the models which conclude the influential factors in each trust phase and also in which method the commitments influence upon trust in the sales process, and thus provides specific recommendations for the establishment and maintenance of the relationships in the sales process.
APA, Harvard, Vancouver, ISO, and other styles
41

Schwartz, Jessica. "Clinician Trust in Predictive Clinical Decision Support for In-Hospital Deterioration." Thesis, 2021. https://doi.org/10.7916/d8-tffc-br50.

Full text
Abstract:
Background The landscape of clinical decision support systems (CDSSs) is evolving to include increasingly sophisticated data-driven methods, such as machine learning, to provide clinicians with predictions about patients’ risk for negative outcomes or their likely responses to treatments (predictive CDSSs). However, trust in predictive CDSSs has shown to challenge clinician adoption of these tools, precluding the ability to positively impact patient outcomes. This is particularly salient in the hospital setting where clinician time is scarce, and predictive CDSSs have the potential to decrease preventable mortality. Many have advised that clinicians should be involved in the development, implementation, and evaluation of predictive CDSSs to increase translation from development to adoption. Yet, little is known about the prevalence of clinician involvement or the factors that influence clinicians’ trust in predictive CDSSs for the hospital setting. The specific aims of this dissertation were: (a) to survey the literature on predictive CDSSs for the hospital setting to describe the prevalence and methods of clinician involvement throughout stages of system design, (b) to identify and characterize factors that influence clinicians’ trust in predictive CDSSs for in-hospital deterioration, and (c) to explore the use of a trust conceptual framework for incorporating clinician expertise into machine learning model development for predicting rapid response activation among hospitalized non-ICU patients using electronic health record (EHR) data. Methods To address the first aim (presented in Chapter Two), a scoping review was conducted to summarize the state of the science of clinician (nurse, physician, physician assistant, nurse practitioner) involvement in predictive CDSS design, with a specific focus on systems using machine learning methods with EHR data for in-hospital decision-making. To address the second aim (presented in Chapter Three), semi-structured interviews with nurses and prescribing providers (i.e., physicians, physicians assistants, nurse practitioners) were conducted and analyzed inductively and deductively (using the Human-Computer Trust conceptual framework) to identify factors that influence trust in predictive CDSSs, using an implemented predictive CDSS for in-hospital deterioration as a grounding example. Finally, to address the third aim (presented in Chapter Four), clinician expertise was elicited in the form of model specifications (requirements, insights, preferences) for facilitating factors shown to influence trust in predictive CDSSs, as guided by the Human-Computer Trust conceptual framework. Specifications included: (a) importance ranking of input features, (b) preference for a more sensitive or specific model, (c) acceptable false positive and negative rates, and (d) prediction lead time. Specifications informed development and evaluation of machine learning models predicting rapid response activation using retrospective EHR data. Results The scoping review identified 80 studies. Seventy-six studies described developing a machine learning model for a predictive CDSS, 28% of which described involving clinicians during development. Clinician involvement during development was categorized as: (a) determining clinical relevance/correctness, (b) feature selection, (c) data preprocessing, and (d) serving as a gold standard. Only five studies described implemented predictive CDSSs and no studies described systems in routine use. The qualitative investigation with 17 clinicians (9 prescribing providers, 8 nurses) confirmed that the Human-Computer Trust concepts of perceived understandability and perceived technical competence are factors that influence hospital clinicians’ trust in predictive CDSSs and further characterized these factors (i.e., themes). This study also identified three additional themes influencing trust: (a) actionability, (b) evidence, and (c) equitability, and found that clinicians’ needs for explanations of machine learning models and the impact of discordant predictions may vary according to the extent to which clinicians rely on the predictive CDSS for decision-making. Only two of 28 categories/sub-categories and one theme emerged uniquely to nurses or prescribing providers. Finally, the third study elicited model specifications from fifteen total clinicians. Not all clinicians answered all questions. Vital sign frequency was ranked the most important feature category on average (n = 8 clinicians), the most frequently preferred prediction lead time was shift-change/8-12 hours (n = 9 clinicians), most preferred a more specific than sensitive model (71%; n = 7 clinicians), the average acceptable false positive rate was 42% (n = 9 clinicians), the average acceptable false negative rate was 29% (n = 6 clinicians). These specifications informed development and testing of four machine learning classification models (ridge regression, decision trees, random forest, and XGBoost). 249,676 patient admissions from 2015–2018 at a large northeastern hospital system were modeled to predict whether or not patients would have a rapid response within the 12-hour shift. The random forest classifier met clinician’s average acceptable false positive (27.7%) and negative rates (28.9%) and was marginally more specific (72.2%) than sensitive (71.1%) on a holdout test set. Conclusions Studies do not routinely report clinician involvement in model development of predictive CDSSs for the hospital setting and publications on implementation considerably lag those on development. Nurses and prescribing providers described largely shared experiences of trust in predictive CDSSs. Clinicians’ reliance on the predictive CDSS for decision-making within the target clinical workflow should be considered when aiming to facilitate trust. Incorporating clinician expertise into model development for the purpose of facilitating trust is feasible. Future research is needed on the impact of clinician involvement on trust, clinicians’ personal attributes that influence trust, and explanation design. Increased education for clinicians about predictive CDSSs is recommended.
APA, Harvard, Vancouver, ISO, and other styles
42

"Understanding Humans to Better Understand Robots in a Joint-Task Environment: The Study of Surprise and Trust in Human-Machine Physical Coordination." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53847.

Full text
Abstract:
abstract: Human-robot interaction has expanded immensely within dynamic environments. The goals of human-robot interaction are to increase productivity, efficiency and safety. In order for the integration of human-robot interaction to be seamless and effective humans must be willing to trust the capabilities of assistive robots. A major priority for human-robot interaction should be to understand how human dyads have been historically effective within a joint-task setting. This will ensure that all goals can be met in human robot settings. The aim of the present study was to examine human dyads and the effects of an unexpected interruption. Humans’ interpersonal and individual levels of trust were studied in order to draw appropriate conclusions. Seventeen undergraduate and graduate level dyads were collected from Arizona State University. Participants were broken up into either a surprise condition or a baseline condition. Participants individually took two surveys in order to have an accurate understanding of levels of dispositional and individual levels of trust. The findings showed that participant levels of interpersonal trust were average. Surprisingly, participants who participated in the surprise condition afterwards, showed moderate to high levels of dyad trust. This effect showed that participants became more reliant on their partners when interrupted by a surprising event. Future studies will take this knowledge and apply it to human-robot interaction, in order to mimic the seamless team-interaction shown in historically effective dyads, specifically human team interaction.
Dissertation/Thesis
Masters Thesis Engineering 2019
APA, Harvard, Vancouver, ISO, and other styles
43

(9873176), Quang Dao. "Addressing the Recommender System Data Solicitation Problem with Engaging User Interfaces." Thesis, 2020.

Find full text
Abstract:

With autonomous systems bringing greater demand for user data, in some applications, this also brings an opportunity to solicit data from users. To exploit this, a user interface will need to be designed to coax the user into achieving system goals, like data solicitation. One approach is to design a system to leverage an already present tendency for people to socially interact with technology. In this thesis, I argue that such an approach would involve incorporating interaction concepts that facilitate engagement into the design of recommender system interfaces that will improve the likelihood of obtaining data from users. To support this claim, I synthesize past work on human-computer interaction and recommender systems to derive a framework to guide scientific investigations into interface design concepts that will address the data solicitation problem.

APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography