Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Technological University Dublin

Privacy

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney Dec 2021

A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney

Articles

This research explores the design and development of a framework for the detection of Dark Patterns, which are a series of user interface tricks that manipulate users into actions that they do not intend to do, for example, share more data than they want to, or spend more money than they plan to. The interface does this using either deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. They are typically varied in their form and what they do, and the goal of this …


The Future Of Medicine Is Digital: Developing Educational Materials To Explore The Ethics Of Digital Pills., Dympna O'Sullivan, J. Paul Gibson, Yael Jacob, Ioannis Stavrakakis, Damian Gordon Oct 2021

The Future Of Medicine Is Digital: Developing Educational Materials To Explore The Ethics Of Digital Pills., Dympna O'Sullivan, J. Paul Gibson, Yael Jacob, Ioannis Stavrakakis, Damian Gordon

Conference papers

Digital Pills are a drug-device technology that permit to combine traditional medications with a monitoring system that automatically records data about medication adherence and patients’ physiological data. They are a promising innovation in digital medicine, however their use has raised a number of ethical concerns. In this paper, we outline some of the main Digital Pills technologies and explore key ethical challenges surrounding their use. In this paper, we introduce educational materials we have developed that provide an insight into the technologies and ethical aspects that underpin Digital Pills.


The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis Jul 2021

The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis

Conference Papers

In the theories of User Interfaces (UI) and User Experience (UX), the goal is generally to help understand the needs of users and how software can be best configured to optimize how the users can interact with it by removing any unnecessary barriers. However, some systems are designed to make people unwillingly agree to share more data than they intend to, or to spend more money than they plan to, using deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. Dark Patterns are varied …


A New Network Model For Cyber Threat Intelligence Sharing Using Blockchain Technology, Daire Homan, Ian Shiel, Christina Thorpe Jan 2019

A New Network Model For Cyber Threat Intelligence Sharing Using Blockchain Technology, Daire Homan, Ian Shiel, Christina Thorpe

Conference Papers

The aim of this research is to propose a new blockchain network model that facilitates the secure dissemination of Cyber Threat Intelligence (CTI) data. The primary motivations for this study are based around the recent changes to information security legislation in the European Union and the challenges that Computer Security and Incident Response Teams (CSIRT) face when trying to share actionable and highly sensitive data within systems where participants do not always share the same interests or motivations. We discuss the common problems within the domain of CTI sharing and we propose a new model, that leverages the security properties …


Multiparty Computations In Varying Contexts, Paul Laird, Sarah Jane Delany, Pierpaolo Dondio Jan 2017

Multiparty Computations In Varying Contexts, Paul Laird, Sarah Jane Delany, Pierpaolo Dondio

Conference papers

Recent developments in the automatic transformation of protocols into Secure Multiparty Computation (SMC) interactions, and the selection of appropriate schemes for their implementation have improved usabililty of SMC. Poor performance along with data leakage or errors caused by coding mistakes and complexity had hindered SMC usability. Previous practice involved integrating the SMC code into the application being designed, and this tight integration meant the code was not reusable without modification. The progress that has been made to date towards the selection of different schemes focuses solely on the two-party paradigm in a static set-up, and does not consider changing contexts. …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2011

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


An Open Source Approach To Wireless Positioning Techniques, Seamus Rooney, Keith Gardiner, James Carswell May 2007

An Open Source Approach To Wireless Positioning Techniques, Seamus Rooney, Keith Gardiner, James Carswell

Conference papers

There are several problems encountered when trying to determine the location of a mobile phone, including weather you are in an urban or rural environment. Also, it is well known that different positioning technologies can work better than others depending on the environment they are in. For example, GPS works well in rural areas but not as well in urban areas, GSM positioning accuracy can be acceptable in urban areas with the right triangulation technology, but is less accurate in rural areas. Positioning with other technologies such as WiFi, Bluetooth, and Semacode all have their own advantages and disadvantages also, …