Refine
H-BRS Bibliography
- yes (65) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (34)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (18)
- Fachbereich Ingenieurwissenschaften und Kommunikation (14)
- Fachbereich Wirtschaftswissenschaften (12)
- Institute of Visual Computing (IVC) (10)
- Institut für Verbraucherinformatik (IVI) (9)
- Institut für Cyber Security & Privacy (ICSP) (6)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (4)
- Fachbereich Angewandte Naturwissenschaften (3)
Document Type
- Conference Object (65) (remove)
Year of publication
- 2020 (65) (remove)
Keywords
- Usable Security (3)
- Artificial Intelligence (2)
- Evolutionary computation (2)
- Peer-to-Peer (2)
- Quality diversity (2)
- robotics (2)
- sustainability (2)
- 2D Level Design (1)
- 3D interfaces (1)
- AMD Family 15h (1)
Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password guessing, or phishing attacks. RBA monitors extra features during login and requests for an additional authentication step if the observed feature values deviate from the usual ones in the login history. In state-of-the-art RBA re-authentication deployments, users receive an email with a numerical code in its body, which must be entered on the online service. Although this procedure has a major impact on RBA's time exposure and usability, these aspects were not studied so far.
We introduce two RBA re-authentication variants supplementing the de facto standard with a link-based and another code-based approach. Then, we present the results of a between-group study (N=592) to evaluate these three approaches. Our observations show with significant results that there is potential to speed up the RBA re-authentication process without reducing neither its security properties nor its security perception. The link-based re-authentication via "magic links", however, makes users significantly more anxious than the code-based approaches when perceived for the first time. Our evaluations underline the fact that RBA re-authentication is not a uniform procedure. We summarize our findings and provide recommendations.
Bei der sechsten Ausgabe des wissenschaftlichen Workshops ”Usable Security und Privacy” auf der Mensch und Computer 2020 werden wie in den vergangenen Jahren aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmenden diskutiert. Drei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, einer mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert*innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security-Engineering, transdisziplinär austauschen können.
Compliant manipulation is a crucial skill for robots when they are supposed to act as helping hands in everyday household tasks. Still, nowadays, those skills are hand-crafted by experts which frequently requires labor-intensive, manual parameter tuning. Moreover, some tasks are too complex to be specified fully using a task specification. Learning these skills, by contrast, requires a high number of costly and potentially unsafe interactions with the environment. We present a compliant manipulation approach using reinforcement learning guided by the Task Frame Formalism, a task specification method. This allows us to specify the easy to model knowledge about a task while the robot learns the unmodeled components by reinforcement learning. We evaluate the approach by performing a compliant manipulation task with a KUKA LWR 4+ manipulator. The robot was able to learn force control policies directly on the robot without using any simulation.
Efficient and comprehensive assessment of students knowledge is an imperative task in any learning process. Short answer grading is one of the most successful methods in assessing the knowledge of students. Many supervised learning and deep learning approaches have been used to automate the task of short answer grading in the past. We investigate why assistive grading with active learning would be the next logical step in this task as there is no absolute ground truth answer for any question and the task is very subjective in nature. We present a fast and easy method to harness the power of active learning and natural language processing in assisting the task of grading short answer questions. A webbased GUI is designed and implemented to incorporate an interactive short answer grading system. The experiments show that active learning saves the time and effort of graders in assessment and reaches the performance of supervised learning with less amount of graded answers for training.
Bei genauer Betrachtung heutiger Sharing Plattformen wie AirBnB, Uber, Drivy oder Fairleihen fällt auf, dass diese eines gemein haben. Als Plattformökonomien basieren sie auf mindestens zwei Nutzergruppen, Anbietern und Nachfragern für Güter oder Dienstleistungen. Ein Problem solcher zweioder mehrseitigen Märkte ist jedoch häufig, dass der Wertezuwachs, der durch die Nutzer generiert wird, nicht gleichmäßig unter der Plattform und den aktiven Nutzern verteilt wird, sondern meist ausschließlich als Gewinn an die Plattformen geht. Mit der Blockchain-Technologie könnte dieses Problem gelöst werden, indem der Informations- und Wertetransfer sicher und dezentral organisiert wird und viele Funktionen traditioneller Intermediäre dadurch obsolet werden. Diese Arbeit bietet einen Überblick über Anwendungsfelder und das Grundkonzept der Sharing Economy. Wir zeigen auf, wie sich Geschäftsmodelle und Infrastrukturen in einer Blockchain abbilden lassen, welche Potentiale eine Blockchain-basierte Infrastruktur bietet, wann diese in der Sharing Economy sinnvoll sein kann und welche Probleme dadurch gelöst werden können.
Trust is the lubricant of the sharing economy. This is true especially in peer-to-peer carsharing, in which one leaves a highly valuable good to a stranger in the hope of getting it back unscathed. Nowadays, ratings of other users are major mechanisms for establishing trust. To foster uptake of peer-to-peer carsharing, connected car technology opens new possibilities to support trust-building, e.g., by adding driving behavior statistics to users' profiles. However, collecting such data intrudes into rentees' privacy. To explore the tension between the need for trust and privacy demands, we conducted three focus group and eight individual interviews. Our results show that connected car technologies can increase trust for car owners and rentees not only before but also during and after rentals. The design of such systems must allow a differentiation between information in terms of type, the context, and the negotiability of information disclosure.
This paper presents groupware to study group behavior while conducting a creative task on large, high-resolution displays. Moreover, we present the results of a between-subjects study. In the study, 12 groups with two participants each prototyped a 2D level on a 7m x 2.5m large, high-resolution display using tablet-PCs for interaction. Six groups underwent a condition where group members had equal roles and interaction possibilities. Another six groups worked in a condition where group members had different roles: level designer and 2D artist. The results revealed that in the different roles condition, the participants worked significantly more tightly and created more assets. We could also detect some shortcomings for that configuration. We discuss the gained insights regarding system configuration, groupware interfaces, and groups behavior.