005 Computerprogrammierung, Programme, Daten
Refine
Departments, institutes and facilities
- Institut für Cyber Security & Privacy (ICSP) (161)
- Institut für Verbraucherinformatik (IVI) (108)
- Fachbereich Informatik (63)
- Fachbereich Wirtschaftswissenschaften (58)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (7)
- Fachbereich Ingenieurwissenschaften und Kommunikation (3)
- Graduierteninstitut (1)
- Institut für funktionale Gen-Analytik (IFGA) (1)
- Institute of Visual Computing (IVC) (1)
- Zentrum für Ethik und Verantwortung (ZEV) (1)
Document Type
- Conference Object (187)
- Article (76)
- Part of a Book (21)
- Book (monograph, edited volume) (12)
- Contribution to a Periodical (8)
- Working Paper (4)
- Conference Proceedings (3)
- Master's Thesis (3)
- Research Data (2)
- Doctoral Thesis (2)
Year of publication
Keywords
- Usable Security (10)
- GDPR (8)
- Cloud (5)
- HTTP (5)
- Privacy (5)
- Usable Privacy (5)
- security (5)
- usable privacy (5)
- Big Data Analysis (4)
- Global Software Engineering (4)
- REST (4)
- Risk-based Authentication (4)
- Web (4)
- Authentication (3)
- Java <Programmiersprache> (3)
- Offshoring (3)
- Python <Programmiersprache> (3)
- Qualitative research (3)
- SOA (3)
- Security (3)
- web caching (3)
- web services (3)
- Artificial Intelligence (2)
- Authentication features (2)
- Business Ethnography (2)
- Claim personal data (2)
- Cloud Security (2)
- Consumer Informatics (2)
- Data literacy (2)
- Data takeout (2)
- Datenmanagement (2)
- Digital Sovereignty (2)
- Digitalisierung (2)
- Food (2)
- Global Software Development (2)
- HCI (2)
- Human Factors In Software Design (2)
- IoT (2)
- Machine Learning (2)
- Malware analysis (2)
- Methodology (2)
- Password (2)
- Practice Theory (2)
- Public Transport (2)
- Qualitative Study (2)
- Risk-based Authentication (RBA) (2)
- SOAP (2)
- Smart Home (2)
- Software (2)
- Sustainability (2)
- TLS (2)
- User Experience (2)
- User-Centered Design (2)
- Verkehrsmittelwahl (2)
- Voice Assistants (2)
- WS-Security (2)
- XML Signature (2)
- XML Signature Wrapping (2)
- end user development (2)
- software engineering (2)
- structural equation modeling (2)
- usability (2)
- 3D Printer (1)
- ACPYPE (1)
- API Documentation (1)
- API usability (1)
- Account (Datenverarbeitung) (1)
- Account Security (1)
- Accounting practices (1)
- Ad Hoc Kommunikation (1)
- Adaptive Media Streaming (1)
- Adaptive Streaming (1)
- Administrative work (1)
- Adoption (1)
- Adoption Factors (1)
- Advance Encryption Standard (1)
- Advances in Design Science Research (1)
- Affective computing (1)
- Agent-Based Modeling (1)
- Agilität (1)
- Alternde Gesellschaft (1)
- Analysis (1)
- Appropriation (1)
- Appropriation Infras-tructure (1)
- Articulation Work (1)
- Attention mechanism (1)
- Authentifikation (1)
- Autonomes Fahren (1)
- Autonomous Driving (1)
- Bewegungsmotivation (1)
- Big Data (1)
- Biometric data (1)
- Black-box models (1)
- Botnet tracking (1)
- Botnets (1)
- Browser cache (1)
- CAE metadata structures (1)
- CC (1)
- Cache Poisoning (1)
- Carbohydrate (1)
- Certificates (1)
- Chen (1)
- Chloroquine (1)
- Cipher Block Chain (1)
- Climate Risks (1)
- Cloud Computing security (1)
- Cloud Malware Injection (1)
- Cloud Standards (1)
- Clusteranalyse (1)
- Co-performance (1)
- CoAP (1)
- Collaborative design (1)
- Common Criteria (1)
- Community (1)
- Computer Aided Software Engineering (1)
- Computer Security (1)
- Computer Support (1)
- Computersicherheit (1)
- Computing Milieux (1)
- Conceptual model (1)
- Conficker (1)
- Conformance Testing (1)
- Connected Car (1)
- Constructionism (1)
- Consumer protection (1)
- Content Security Policies (1)
- Context (1)
- Cooperative Intelligent Transport Systems (ITS) (1)
- Cooperative Work (1)
- Countermeasures (1)
- Creative Commons (1)
- Crisis management (1)
- Curse of dimensionality (1)
- Cyber Attacks (1)
- Cyber Security (1)
- Cybercrime (1)
- Cybercrime Legislation (1)
- DASH (1)
- DNSSEC (1)
- DSGVO (1)
- Data (1)
- Data Compression (1)
- Data Integration (1)
- Data Literacy (1)
- Data Protection Officer (1)
- Data Reduction (1)
- Data Science (1)
- Data Storytelling (1)
- Data Storytelling Process (1)
- Data Tiles (1)
- Data collection (1)
- Data protection by design (1)
- Data visualization (1)
- Data-Storytelling-Prozess (1)
- Datenbanken (1)
- Datenbanksysteme (1)
- Datenkompetenz (1)
- Datenmodellierung (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Datenwissenschaft (1)
- Deep Learning (1)
- Denial of Service (1)
- Deployment (1)
- Design (1)
- Design Case Study (1)
- Design Probe (1)
- Design patterns (1)
- Deskriptive Datenanalyse (1)
- Developer Centered Security (1)
- Difference-coding (1)
- Digital Ecosystem (1)
- Digital Energy Management (1)
- Digital Plumbing (1)
- Digital Receipt (1)
- Digital signatures (1)
- Digitale Lehre (1)
- Digitaler Konsum (1)
- Digitalisierungsstrategie (1)
- Dimensionsreduktion (1)
- Disclosive ethics (1)
- Distribute Software Development (1)
- Domestic Robots (1)
- Domestic Technology (1)
- Domestic workplace studies (1)
- E-Health (1)
- ELSI (1)
- ERM (1)
- Ecosystems (1)
- Effective purpose specification (1)
- Elderly (1)
- Electric micromobility (1)
- Electronic Data Capture (EDC) (1)
- Embodied knowledge (1)
- Empirical Study (1)
- Employee data protection (1)
- Employment (1)
- End-User Development (1)
- Engaging Experience (1)
- Entity-Relationship-Datenmodell (1)
- Entity-Relationship-Modell (1)
- Entitätsmengen-Beziehungs-Modell (1)
- Environment Perception (1)
- Eriodictyol (1)
- Ethnographic Research (1)
- Evaluation (1)
- Expert Interviews (1)
- Fake review cues (1)
- Fake review detection (1)
- File carving (1)
- Financial practices (1)
- Folk theories (1)
- Food Practices (1)
- Food literacy (1)
- Force field (1)
- Fragmented files (1)
- Frontend architecture (1)
- Full-text Search (1)
- Geo-tagging (1)
- Geschäftsmodell (1)
- Gesundheit (1)
- Glycam06 (1)
- Grassroots (1)
- Gromacs (1)
- HFI (1)
- HTML5 (1)
- HTTPS (1)
- Hauswirtschaft (1)
- Header whitelisting (1)
- Highly Automated Driving (1)
- Hochschullehre (1)
- Host-Based Code Injection Attacks (1)
- Household management (1)
- Human autonomy (1)
- Human computer interaction (1)
- Human computer interaction (HCI) (1)
- Human factors (1)
- Human review fraud detection (1)
- Human-Centered Robotics (1)
- Human-Robot-Interaction (HRI) (1)
- Human-centered computing (1)
- Human-food interaction (1)
- Human–Food Interaction (1)
- Hydroxychloroquine (1)
- ICT (1)
- IIoT (1)
- ISO 27000 (1)
- IT-Management (1)
- IT-Sicherheitsanforderungen (1)
- IT-Strategie (1)
- Implementation Challenges (1)
- Implementation Model (1)
- Individual Empowerment (1)
- Informational self-determination (1)
- Informationssicherheit (1)
- Infrastructuring (1)
- Infrastruktur (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Intelligence Amplification (1)
- Intelligence Augmentation (1)
- Intelligent Process Automation (1)
- Interactive Artifacts (1)
- Interbank Market (1)
- Intermediaries (1)
- Internet Technology (1)
- Internet of Things (1)
- Interpretability (1)
- Interviews (1)
- Invisible AI (1)
- IoT services security (1)
- JOSE (1)
- JPEGs (1)
- JSON (1)
- KMU (1)
- Labordaten (1)
- Large-Scale Online Services (1)
- Last mile problem (1)
- Lead userness (1)
- Learning (1)
- Learning Environments (1)
- Learning and Adaptive Systems (1)
- Legal Design (1)
- Legal metrology (1)
- Liquidity Crises (1)
- Live Streaming (1)
- Living Lab (1)
- Login (1)
- MLOps Tools (1)
- MLR (1)
- Malware (1)
- Malware Detection (1)
- Management (1)
- Marketplaces (1)
- Memory forensics (1)
- Mental Models (1)
- Mental models (1)
- Message Authentication (1)
- Microservices (1)
- Microsoft (1)
- Misconception (1)
- Mixed / augmented reality (1)
- Mobile devices (1)
- Mobility (1)
- Mobiltelefone (1)
- Model surrogation (1)
- Modellierung (1)
- Multimedia Communication (1)
- Multimedia forensics (1)
- Multimodal Mobility (1)
- Nachhaltigkeit (1)
- Nearshoring (1)
- Nonbonded scaling factor (1)
- Nutzerakzeptanz (1)
- OER (1)
- Online Services (1)
- Open Access (1)
- Open Educational Ressources (1)
- OpenStack (1)
- Opinion scam (1)
- Organizations (1)
- PHR (1)
- Partial Data Protection (1)
- Partial Signature (1)
- PartialEncryption (1)
- Participatory Design (1)
- Participatory Design Approach (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Passwort (1)
- Peer-to-Peer (1)
- Perceived AI (1)
- Performance (1)
- Personal Health Record (1)
- Persuasive Systeme (1)
- Phishing (1)
- Platform economy (1)
- Policy (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Privacy in the workplace (1)
- Privacy patterns (1)
- Privacy perceptions (1)
- Privatsphäre (1)
- Programmer Workbench (1)
- Prudential Regulation (1)
- Public Cloud Services (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- RACS (1)
- RBAR (1)
- REDCap (1)
- REST security (1)
- Reference Architectural Model Automotive (RAMA) (1)
- Relationenmodell (1)
- Relative Energies (1)
- Relativer Mehrwert (1)
- Repositories (1)
- Requirements Engineering (1)
- Research Trajectories (1)
- Research methods (1)
- Resilienz (1)
- Restful Web Services (1)
- Review scam (1)
- Risk Perception (1)
- Risk-Based Account Recovery (1)
- Robotic Process Automation (1)
- SAML (1)
- SARS-CoV-2 (1)
- SELMA (1)
- SID (1)
- SME (1)
- SOS calls (1)
- SaaS (1)
- Safety (1)
- Scholarly workbench (1)
- Schutzobjekte (1)
- Scientific workbench (1)
- Secure Cloud Storage (1)
- Secure Coding Practices (1)
- Secure data transfer (1)
- Security APIs (1)
- Security Protocol (1)
- Selbstfahrende Autos (1)
- Selbstfahrtechnik (1)
- Self-Driving Cars (1)
- Self-driving (1)
- Semantic gap (1)
- Sensorbasierte Systeme (1)
- Service Design (1)
- Service-Oriented Architecture (1)
- Shared Autonomous Vehicles (1)
- Sichere Kommunikation Kritische Infrastrukturen (1)
- Silmitasertib (1)
- Small to medium-sized enterprises (1)
- Smart metering (1)
- Smartphones (1)
- Sociable Technologies (1)
- Social Capital (1)
- Social Media (1)
- Social learning (1)
- Socio Informatics (1)
- Software Development (1)
- Software Security (1)
- Software as a Service (1)
- Stuxnet (1)
- Sustainable HCI (1)
- Taste (1)
- Testing (1)
- Testing Tool (1)
- Thin Client (1)
- Transportation (1)
- Trust (1)
- Two-factor Authentication (1)
- UI-Dressing (1)
- URI (1)
- UXD (1)
- Umfrage (1)
- Usable Security and Privacy (1)
- Usage Experience (1)
- User Requirements (1)
- User-perspective (1)
- Valproic acid (1)
- Vehicle-2-Infrastructure Kommunikation (1)
- Vehicle-2-Vehicle Kommunikation (1)
- Verbraucherforschung (1)
- Verbraucherinformatik (1)
- Verification systems (1)
- Video (1)
- Virtual Reality (1)
- Voight-Kampff test (1)
- Vorgehensmodell (1)
- Warnings (1)
- Web Browser (1)
- Web Browser Cache (1)
- Web Information Systems and Technologies (1)
- Web Interfaces and Applications (1)
- Web Portal (1)
- Web Security (1)
- Web Service (1)
- Web Service Security (1)
- Web Services and Web Engineering (1)
- Web-Tracking (1)
- WebSocket (1)
- WebSockets (1)
- Well-being (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- Work (1)
- Workflow (1)
- XML (1)
- XML Security (1)
- XSpRES (1)
- Zeitreihenanalyse (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- accelerometer (1)
- appropriation (1)
- attacks (1)
- breakdowns (1)
- caching (1)
- carsharing (1)
- co-design (1)
- conformations (1)
- connected car (1)
- consumer informatics (1)
- cooperation (1)
- critical consumerism (1)
- cryptographic apis (1)
- culture (1)
- culture of participation (1)
- data literacy (1)
- data management (1)
- data science (1)
- data science canvas (1)
- data visualization (1)
- database systems (1)
- decision support system (1)
- deep learning (1)
- democratization (1)
- design probe (1)
- developer console (1)
- digital fabrication (1)
- digital platform ecosystem (1)
- distributed systems (1)
- drugs (1)
- eco-feedback (1)
- emergency response (1)
- emotion recognition (1)
- employee privacy (1)
- end-to-end security (1)
- ethics (1)
- ethnographically informed studies (1)
- ethnography (1)
- factor analysis (1)
- focus groups (1)
- food waste (1)
- higher education (1)
- human-centred design (1)
- humanoidrobot (1)
- informational self-determination (1)
- innovative work behavior (1)
- intervention mechanisms (1)
- knowledge graphs (1)
- knowledge management (1)
- knowledge sharing practices (1)
- latent class analysis (1)
- maker communities (1)
- mental models (1)
- mobile computing (1)
- mobility intelligence (1)
- multi-sensory (1)
- natural language processing (1)
- ontology (1)
- open educational resources (OERs) (1)
- optimized geometries (1)
- organizational management and coordination (1)
- participatory design (1)
- pervasive computing (1)
- posture analysis (1)
- privacy at work (1)
- privacy by design (1)
- privacy preferences (1)
- privacy settings (1)
- process infrastructure (1)
- project management (1)
- prosumption (1)
- qualitative research methods (1)
- question answering (1)
- reCAPTCHA (1)
- recommender systems (1)
- right to access (1)
- security and privacy literacy (1)
- security warning design (1)
- semantic technologies (1)
- services (1)
- shared mobility (1)
- sharing (1)
- signature (1)
- simulation process (1)
- small enterprises (1)
- small molecule (1)
- smart meters (1)
- social robots (1)
- software development (1)
- spinal posture (1)
- sustainability (1)
- sustainable mobility (1)
- technological platform (1)
- text mining (1)
- transfer learning (1)
- transparency-enhancing technologies (1)
- usable privacy controls (1)
- usable secure email (1)
- user interface design (1)
- user journey (1)
- validity (1)
- visibility (1)
- visualization (1)
- voice interaction (1)
- wearable sensor (1)
- web services security (1)
- wine (1)
Software developers build complex systems using plenty of third-party libraries. Documentation is key to understand and use the functionality provided via the libraries’ APIs. Therefore, functionality is the main focus of contemporary API documentation, while cross-cutting concerns such as security are almost never considered at all, especially when the API itself does not provide security features. Documentations of JavaScript libraries for use in web applications, e.g., do not specify how to add or adapt a Content Security Policy (CSP) to mitigate content injection attacks like Cross-Site Scripting (XSS). This is unfortunate, as security-relevant API documentation might have an influence on secure coding practices and prevailing major vulnerabilities such as XSS. For the first time, we study the effects of integrating security-relevant information in non-security API documentation. For this purpose, we took CSP as an exemplary study object and extended the official Google Maps JavaScript API documentation with security-relevant CSP information in three distinct manners. Then, we evaluated the usage of these variations in a between-group eye-tracking lab study involving N=49 participants. Our observations suggest: (1) Developers are focused on elements with code examples. They mostly skim the documentation while searching for a quick solution to their programming task. This finding gives further evidence to results of related studies. (2) The location where CSP-related code examples are placed in non-security API documentation significantly impacts the time it takes to find this security-relevant information. In particular, the study results showed that the proximity to functional-related code examples in documentation is a decisive factor. (3) Examples significantly help to produce secure CSP solutions. (4) Developers have additional information needs that our approach cannot meet.
Overall, our study contributes to a first understanding of the impact of security-relevant information in non-security API documentation on CSP implementation. Although further research is required, our findings emphasize that API producers should take responsibility for adequately documenting security aspects and thus supporting the sensibility and training of developers to implement secure systems. This responsibility also holds in seemingly non-security relevant contexts.
Diese Studie untersucht die Aneignung und Nutzung von Sprachassistenten wie Google Assistant oder Amazon Alexa in Privathaushalten. Unsere Forschung basiert auf zehn Tiefeninterviews mit Nutzern von Sprachassistenten sowie der Evaluation bestimmter Interaktionen in der Interaktionshistorie. Unsere Ergebnisse illustrieren, zu welchen Anlässen Sprachassistenten im heimischen Umfeld genutzt werden, welche Strategien sich die Nutzer in der Interaktion mit Sprachassistenten angeeignet haben, wie die Interaktion abläuft und welche Schwierigkeiten sich bei der Einrichtung und Nutzung des Sprachassistenten ergeben haben. Ein besonderer Fokus der Studie liegt auf Fehlinteraktionen, also Situationen, in denen die Interaktion scheitert oder zu scheitern droht. Unsere Studie zeigt, dass das Nutzungspotenzial der Assistenten häufig nicht ausgeschöpft wird, da die Interaktion in komplexeren Anwendungsfällen häufig misslingt. Die Nutzer verwenden daher den Sprachassistenten eher in einfachen Anwendungsfällen und neue Apps und Anwendungsfälle werden gar nicht erst ausprobiert. Eine Analyse der Aneignungsstrategien, beispielsweise durch eine selbst erstellte Liste mit Befehlen, liefert Erkenntnisse für die Gestaltung von Unterstützungswerkzeugen sowie die Weiterentwicklung und Optimierung von sprachbasierten Mensch-Maschine-Interfaces.
Sharing economies enabled by technical platforms have been studied regarding their economic, legal, and social effects, as well as with regard to their possible influences on CSCW topics such as work, collaboration, and trust. While a lot current research is focusing on the sharing economy and related communities, there is little work addressing the phenomenon from a socio-technical point of view. Our workshop is meant to address this gap. Building on research themes and discussion from last year’s ECSCW, we seek to engage deeper with topics such as novel socio-technical approaches for enabling sharing communities, discussing issues around digital consumer and worker protection, as well as emerging challenges and opportunities of existing platforms and approaches.
3D Printers as Sociable Technologies: Taking Appropriation Infrastructures to the Internet of Things
(2017)
In Fortführung zu den drei erfolgreichen „Usable Security und Privacy“ Workshops der letzten drei Jahre, sollen in einem vierten ganztätigen wissenschaftlichen Workshop auf der diesjährigen Mensch und Computer sechs bis acht Arbeiten auf dem Gebiet Usable Security and Privacy vorgestellt und diskutiert werden. Vorgesehen sind Beiträge aus Forschung und Praxis, die neue nutzerzentrierte Ansätze aber auch praxisrelevante Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen thematisieren. Mit dem Workshop soll das etablierte Forum weiterentwickelt werden, in dem sich Experten aus unterschiedlichen Domänen, z. B. dem Usability-Engineering und Security-Engineering, transdisziplinär austauschen können. Der Workshop wird von den Organisatoren als klassischer wissenschaftlicher Workshop ausgestaltet. Ein Programmkomitee bewertet die Einreichungen und wählt daraus die zur Präsentation akzeptierten Beiträge aus. Diese werden zudem im Poster- und Workshopband der Mensch und Computer 2018 veröffentlicht.
Bei der sechsten Ausgabe des wissenschaftlichen Workshops ”Usable Security und Privacy” auf der Mensch und Computer 2020 werden wie in den vergangenen Jahren aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmenden diskutiert. Drei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, einer mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert*innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security-Engineering, transdisziplinär austauschen können.
Auch die mittlerweile siebte Ausgabe des wissenschaftlichen Workshops “Usable Security und Privacy” auf der Mensch und Computer 2021 wird aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmer:innen diskutiert. Zwei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, zwei mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert:innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security- Engineering, transdisziplinär austauschen können.
Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen Bereichen, z. B. Usability und Security Engineering, transdisziplinär austauschen können.
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
New cars are increasingly "connected" by default. Since not having a car is not an option for many people, understanding the privacy implications of driving connected cars and using their data-based services is an even more pressing issue than for expendable consumer products. While risk-based approaches to privacy are well established in law, they have only begun to gain traction in HCI. These approaches are understood not only to increase acceptance but also to help consumers make choices that meet their needs. To the best of our knowledge, perceived risks in the context of connected cars have not been studied before. To address this gap, our study reports on the analysis of a survey with 18 open-ended questions distributed to 1,000 households in a medium-sized German city. Our findings provide qualitative insights into existing attitudes and use cases of connected car features and, most importantly, a list of perceived risks themselves. Taking the perspective of consumers, we argue that these can help inform consumers about data use in connected cars in a user-friendly way. Finally, we show how these risks fit into and extend existing risk taxonomies from other contexts with a stronger social perspective on risks of data use.
Integrating physical simulation data into data ecosystems challenges the compatibility and interoperability of data management tools. Semantic web technologies and relational databases mostly use other data types, such as measurement or manufacturing design data. Standardizing simulation data storage and harmonizing the data structures with other domains is still a challenge, as current standards such as the ISO standard STEP (ISO 10303 ”Standard for the Exchange of Product model data”) fail to bridge the gap between design and simulation data. This challenge requires new methods, such as ontologies, to rethink simulation results integration. This research describes a new software architecture and application methodology based on the industrial standard ”Virtual Material Modelling in Manufacturing” (VMAP). The architecture integrates large quantities of structured simulation data and their analyses into a semantic data structure. It is capable of providing data permeability from the global digital twin level to the detailed numerical values of data entries and even new key indicators in a three-step approach: It represents a file as an instance in a knowledge graph, queries the file’s metadata, and finds a semantically represented process that enables new metadata to be created and instantiated.
In this paper, we present a solution how to test cultural influences on E-Learning in a global context. Based on a metadata approach, we show how specifically cultural influence factors can be determined to transfer and adapt learning environments. We present a method how those influence factors can be validated for both, to improve the dynamical meta-data specification and to be used in the development of (international) E-Learning scenarios.
Background
Consumers rely heavily on online user reviews when shopping online and cybercriminals produce fake reviews to manipulate consumer opinion. Much prior research focuses on the automated detection of these fake reviews, which are far from perfect. Therefore, consumers must be able to detect fake reviews on their own. In this study we survey the research examining how consumers detect fake reviews online.
Methods
We conducted a systematic literature review over the research on fake review detection from the consumer-perspective. We included academic literature giving new empirical data. We provide a narrative synthesis comparing the theories, methods and outcomes used across studies to identify how consumers detect fake reviews online.
Results
We found only 15 articles that met our inclusion criteria. We classify the most often used cues identified into five categories which were (1) review characteristics (2) textual characteristics (3) reviewer characteristics (4) seller characteristics and (5) characteristics of the platform where the review is displayed.
Discussion
We find that theory is applied inconsistently across studies and that cues to deception are often identified in isolation without any unifying theoretical framework. Consequently, we discuss how such a theoretical framework could be developed.
Herein we report an update to ACPYPE, a Python3 tool that now properly converts AMBER to GROMACS topologies for force fields that utilize nondefault and nonuniform 1–4 electrostatic and nonbonded scaling factors or negative dihedral force constants. Prior to this work, ACPYPE only converted AMBER topologies that used uniform, default 1–4 scaling factors and positive dihedral force constants. We demonstrate that the updated ACPYPE accurately transfers the GLYCAM06 force field from AMBER to GROMACS topology files, which employs non-uniform 1–4 scaling factors as well as negative dihedral force constants. Validation was performed using β-d-GlcNAc through gas-phase analysis of dihedral energy curves and probability density functions. The updated ACPYPE retains all of its original functionality, but now allows the simulation of complex glycomolecular systems in GROMACS using AMBER-originated force fields. ACPYPE is available for download at https://github.com/alanwilter/acpype.