Searched for: subject:"Trust"
(1 - 20 of 48)

Pages

document
Broecks, K.P.F. (author), Jack, C. (author), ter Mors, E. (author), Boomsma, C. (author), Shackley, S. (author)
Carbon Capture and Storage at industrial processes (industrial CCS) is expected to play an important role in reducing industrial CO2 emissions in the short term. Industrial CCS involves capturing CO2 from industrial processes, such as steel and cement making, and storing the CO2 underground. This study examined the public opinion of industrial...
article 2021
document
Kox, E.S. (author), Kerstholt, J.H. (author), Hueting, T.F. (author), de Vries, P.W. (author)
The role of intelligent agents becomes more social as they are expected to act in direct interaction, involvement and/or interdependency with humans and other artificial entities, as in Human-Agent Teams (HAT). The highly interdependent and dynamic nature of teamwork demands correctly calibrated trust among team members. Trust violations are an...
article 2021
document
Bastiaansen, H.J.M. (author), Dalmolen, S. (author), Kollenstart, M. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a ‘hub-model’ approach. This...
conference paper 2020
document
de Visser, E.J. (author), Peeters, M.M.M. (author), Jung, M.F. (author), Kohn, S. (author), Shaw, T.H. (author), Pak, R. (author), Neerincx, M.A. (author)
The introduction of artificial teammates in the form of autonomous social robots, with fewer social abilities compared to humans, presents new challenges for human–robot team dynamics. A key characteristic of high performing human-only teams is their ability to establish, develop, and calibrate trust over long periods of time, making the...
article 2020
document
Waa, J.V.D. (author), Schoonderwoerd, T. (author), Diggelen, J.V. (author), Neerincx, M. (author)
Decision support systems (DSS) have improved significantly but are more complex due to recent advances in Artificial Intelligence. Current XAI methods generate explanations on model behaviour to facilitate a user's understanding, which incites trust in the DSS. However, little focus has been on the development of methods that establish and...
article 2020
document
Bastiaansen, H.J.M. (author), Kollenstart, M. (author), Dalmolen, S. (author), van Engers, T.M. (author)
Organizations increasingly collaborate in digital ecosystems, whilst being aware that data is becoming a key asset. They require improved data control capabilities that prevent their shared data from being misused. Currently, such capabilities are typically realized as situation-specific closed ecosystem solutions in a 'hub-model' approach. This...
conference paper 2020
document
Seepers, R.M. (author), Smulders, A.C.M. (author), Meeuwissen, H.B. (author)
Zero trust’ is een term die steeds meer draagvlak krijgt binnen de cybersecuritygemeenschap. Centraal achter het zero trust-gedachtegoed is dat er fundamenteel anders moet worden omgegaan met de beveiligingsarchitectuur van een organisatie en haar (IT) infrastructuur: van ‘trust, but verify’ naar ‘don’t trust, verify!’ [1]. In een zero trust...
article 2020
document
Walker, F. (author), Steinke, J. (author), Martens, M.H. (author), Verwey, W.B. (author)
To maximize road safety, driver trust in an automated vehicle should be aligned with the vehicle's technical reliability, avoiding under- and over-estimation of its capabilities. This is known as trust calibration. In the study reported here, we asked how far participant assessments of vehicle capabilities aligned with those of the engineers....
article 2020
document
Wijn, R. (author), van der Weerdt, C. (author), van der Kleij, R. (author), Young, H. (author)
Trust is paramount for creating social and business relations, adopting technology, cooperating and creating economic value. With an increasingly digital economy, no wonder the importance of digital trust is advocated by so many scholars and businesses alike. However, contrary to purported common wisdom, we propose that actual trust is not...
bookPart 2020
document
de Visser, E.J. (author), Peeters, M.M.H. (author), Jung, M.F. (author), Kohn, S. (author), Shaw, T.H. (author), Pak, R. (author), Neerincx, M.A. (author)
The introduction of artificial teammates in the form of autonomous social robots, with fewer social abilities compared to humans, presents new challenges for human–robot team dynamics. A key characteristic of high performing human-only teams is their ability to establish, develop, and calibrate trust over long periods of time, making the...
article 2019
document
Walker, F. (author), Wang, J. (author), Martens, M.H. (author), Verwey, W.B. (author)
Studies show that drivers’ intention to use automated vehicles is strongly modulated by trust. It follows that their benefits are unlikely to be achieved if users do not trust them. To date, most studies of trust in automated vehicles have relied on self-reports. However, questionnaires cannot capture real-time changes in drivers’ trust, and are...
article 2019
document
Tielman, M.L. (author), Neerincx, M.A. (author), Brinkman, W.P. (author)
BACKGROUND: Systems incorporating virtual agents can play a major role in electronic-mental (e-mental) health care, as barriers to care still prevent some patients from receiving the help they need. To properly assist the users of these systems, a virtual agent needs to promote motivation. This can be done by offering motivational messages....
article 2019
document
Koning, R. (author), Deljoo, A. (author), Meijer, L. (author), Laat, C.D. (author), Grosso, P. (author)
Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks...
conference paper 2019
document
Dalmolen, S. (author), Bastiaansen, H.J.M. (author), Moonen, H. (author), Hofman, W.J. (author), Punter, L.M. (author), Cornelisse, E. (author)
In support of the trend towards ever more complex supply chain collaboration for the Physical Internet, a trusted, multi-tenant (and interoperable) data sharing infrastructure has to be enabled. Trust is a condition sine qua non organizations may not be prepared to share potentially competitive sensitive information. As such, trust has to be an...
conference paper 2018
document
Kerstholt, J.H. (author), Duijnhoven, H.L. (author), Paton, D. (author)
Worldwide there is a growing need for citizens to prepare for environmental risks to mitigate potential adversity. In order to predict preparedness, behavioral models typically used variables at an individual level of analysis, such as risk perception and assessment of the effectiveness of possible actions (response-efficacy). The present study...
article 2017
document
Wang, W. (author), van Lint, C.L. (author), Brinkman, W.P. (author), Rövekamp, T.J.M. (author), van Dijk, S. (author), van der Boog, P.J.M. (author), Neerincx, M.A. (author)
Background: Self-management support systems (SMSS) have been proposed for renal transplant patients to increase their autonomy and reduce the number of hospital visits. For the design and implementation of such systems, it is important to understand factors influencing patients’ acceptance of a SMSS. This paper aims to identify these key factors...
article 2017
document
Lueks, W. (author), Everts, M.H. (author), Hoepman, J.H. (author)
Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help...
conference paper 2016
document
Bortolameotti, R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author), Hartel, P. (author)
We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent developments of data breach notification laws....
conference paper 2016
document
van de Kamp, T.R. (author), Peter, A. (author), Everts, M.H. (author), Jonker, W. (author)
Information sharing helps to better protect computer sys- tems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. Instead, they only exchange this informa- tion with parties with whom they already established...
conference paper 2016
document
DunnGalvin, A. (author), Chun-Han, C. (author), Crevel, R. (author), Grimshaw, K. (author), Poms, R. (author), Schnadt, S. (author), Taylor, S.L. (author), Turner, P. (author), Allen, K.J. (author), Austin, M. (author), Baka, A. (author), Baumert, J.L. (author), Baumgartner, S. (author), Beyer, K. (author), Bucchini, L. (author), Fernández-Rivas, M. (author), Grinter, K. (author), Houben, G.F. (author), Hourihane, J. (author), Kenna, F. (author), Kruizinga, A.G. (author), Lack, G. (author), Madsen, C.B. (author), Mills, E.N. (author), Papadopoulos, N.G. (author), Alldrick, A. (author), Regent, L. (author), Sherlock, R. (author), Wal, J.M. (author), Roberts, G. (author)
Precautionary allergen labelling (PAL) was introduced by the food industry to help manage and communicate the possibility of reaction from the unintended presence of allergens in foods. However, in its current form, PAL is counter-productive for consumers with food allergies. This review aims to summarise the perspectives of all the key...
article 2015
Searched for: subject:"Trust"
(1 - 20 of 48)

Pages