P2-0037 — Final report
1.
User bias identification and mitigation in online trust systems

The paper investigates the role of user bias in online trust systems and develops a methodology for the design of better systems. It delves into the workings of online computational trust systems under user bias and analyses the user behaviour through biases defined by Prospect theory. The results of an empirical study and the analysis are used to propose to the system designers a methodology for user bias identification and mitigation for trust systems based on the subjective logic theory, which reduces complexity and improves the user experience and the system performance.

COBISS.SI-ID: 29835815
2.
Vectorial bent function for the cryptographic algorithms

Vectorial Boolean bent functions, which possess the maximal nonlinearity and the minimum differential uniformity, contribute to optimum resistance against linear cryptanalysis and differential cryptanalysis for the cryptographic algorithms that adopt them as nonlinear components. The maximum number of these functions is calculated in the article as an important data in designing Boolean based crypto systems that are resisting several types of crypto-analysis.

COBISS.SI-ID: 31065383
3.
Privacy protection in mobile networks

The paper describes a structural model on the relation between user's trust in mobile and ad-hoc networks and characteristics of her environment. The model is based on an analysis and empirical evaluation of the mobile phones inbuilt security measures and user attitude and awareness about privacy among the users from several countries. The analysis and evaluation results show that most of the smart phones provide some sort of protection. Key environment factors that influence the attitude and awareness of the users are level of development, accessibility of the modern technology, and the user purchasing power.

COBISS.SI-ID: 28585767
4.
Improvement of graphical authentication methods

This paper investigates user choices in password selection for recognition-based graphical authentication in online services. Our analysis is based on a total of 302 participants continuously using a graphical authentication system during a 6-week long study. The results show pronounced preference effects for image properties such as colour, shape, and category. The results in the form of graphical password selection guidelines are useful for any online services providers who want to improve security and usability of their graphical authentication solutions.

COBISS.SI-ID: 23192038
5.
Model for optimal security technology investment

This paper presents a mathematical model for decision taking for an investment in the information security technology. The decision-­making process is based on a quantitative analysis of the security risks and a digital­ assets assessment in an organization. The model makes use of a quantitative analysis of different security measures that counteract individual risks by identifying the information ­system processes in an enterprise and the potential threats. The model comprises the target security levels for all identified core business processes and the probability of a security accident together with the possible loss the organization may suffer. The model allows in­depth analysis and computations providing quantitative assessments of different options for investments, which translate into recommendations that facilitate the selection of the best solution and the associated decision­making. The model was tested with data from a real business environment.

COBISS.SI-ID: 25578535
6.
Scenarios for future evolution of the Internet

The publication identifies the main obstacles in the Future Internet evolution and the problems that have appeared with the enlargement and the complexity of the network. The evolution directions are discussed and four scenarios for development are presented. The scenarios are evaluated and the best model based on the user and service providers needs is selected and its future evolution recommended.

COBISS.SI-ID: 25533991
7.
Older users' home telehealth services acceptance behaviour

The paper identifies key factors that affect acceptance of telehealth services among older users. Although telehealth offers an improved approach to providing healthcare services, its adoption by users remains slow. By a rigorous analysis of the results of a survey among 400 users we have found that the level at which the services are perceived as easy to use and manage is the leading acceptance predictor in older users' service acceptance. Also, the intuitiveness of graphical user interfaces and perceived security are key factors determining the success of the initial adoption. The paper also introduces important methodological guidelines for measuring perceptions on a conceptual level of future services that currently do not exist.

COBISS.SI-ID: 23020006
8.
Vectorial bent functions from multiple terms trace functions

In this paper several necessary and sufficient conditions related to vectorial bent functions given in a multiple trace form are derived. These conditions can be efficiently used for specifying vectorial bent functions given in the particular trace form considered, essentially using the sum of trace monomials with Dillon exponents. The approach based on the use of elementary symmetric polynomials to establish the bentness of binomial trace mappings seems to be an interesting framework for handling the vectorial bent property of these mappings, used in cryptographic algorithms.

COBISS.SI-ID: 1536201924
9.
Value-oriented supply chain risk management

In line with the expectation confirmation theory the authors have found that the primary reason for the understanding the value of supply chain risk management (SCRM) is in companies’ attitudes. Their main expectation is risk avoidance and not the value generation. In such a case, even “successful” SCRM programmes merely confirm the expectation that they will have a limited impact and the company usually continues to avoid risk while limiting the resources for SCRM. The change is only when the expected benefit of SCRM is not solely risk avoidance but mainly value generation that increased attention can be expected over time.

COBISS.SI-ID: 23090150
10.
Factors of broadband development and the design of a strategic policy framework

This paper presents the results of a study with objectives to identify the common factors influencing the development of broadband communications in Europe with an aim to elaborate their importance and influence. The study was carried out within the European FP6 BReATH project with a goal to determine the key components when deploying broadband access services. The empirical and the analytical study presented in the paper have pointed to more than ten factors that influence the development and the adoption of broadband infrastructure. At the same time, they have revealed that even for Europe no general model with common factors can be applied for all European regions for development of strategic plans and actions. A set of enablers and measures to be selected for strategy development by different environments were suggested.

COBISS.SI-ID: 21336103