Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
psychology
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
Deliberative and Affective Reasoning: a Bayesian Dual-Process Model
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
Intelligent Agents
affective reasoning
Artificial agents
BayesAct agents
Bayesian dual-process model
computationally tractable model
decision theoretic reasoning
emotional level
free energy
human experience
human social networks
affective alignment
intelligent computational agents
plausible model
social experiences
social order
social sciences computing
social-psychological Bayesian affect control theory
social-psychological theory
socio-technical system
sociological theory
technological agents
inference mechanisms
Bayes methods
pubcrawl
Computational modeling
multi-agent systems
collaboration
chatbots
Complexity theory
cognition
Human Factors
Markov Decision Process
Scalability
Artificial Intelligence
Biological system modeling
affective computing
human interaction
social interactions
psychology
Social Agents
active inference
affect control theory
biblio
Can Social Agents elicit Shame as Humans do?
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
job interviews
Training
social emotion shame
social agents elicit shame
Social Agents
social agent
shame
Scalability
pubcrawl
psychology
Atmospheric measurements
Job Interview Training
Interviews
Humanoid robots
Human Factors
Games
experiment
emotions
behavioural sciences computing
biblio
Social Action in Socially Situated Agents
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Evolution
Social Agents
traditional action
sociotechnical systems
Socio technical systems
socially situated agents
social self awareness
social action
shared world
Rivers
interacting systems
goal-rationality
evolutionary instability
Scalability
behavioural instability
social sciences
software agents
interactive systems
Human Factors
psychology
Interference
Mathematical model
multi-agent systems
Neurons
pubcrawl
Task Analysis
biblio
Computational Stylometry and Machine Learning for Gender and Age Detection in Cyberbullying Texts
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
Age Detection
Computational Stylometry
Cyberbullying Detection
feature extraction
Gender Detection
Human behavior
Human Factors
Linguistics
machine learning
Metrics
psychology
pubcrawl
Semantics
Social network services
stylometry
taxonomy
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
psychology
Computing Theory and Trust
trust modeling
systems engineering processes
Systems architecture
System Engineering
requirements analysis
graph-based modeling methodology
graph-based algorithm
engineering trust
disparate system
Component architectures
complex multitiered system architectures
complex intersystem trust relationships
Compositionality
cognition
security of data
modeling
Risk
evaluation
Trust management
Measurement
trust
systems engineering
Vulnerability
Metrics
Computational modeling
graph theory
composability
pubcrawl
Trusted Computing
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
policy-based network administration
usability
trust-based performance evaluation
telecommunication security
Routing protocols
routing protocol design
Resiliency
resilience
quality of service (QoS)
quality of service
QoS
pubcrawl
psychology
Pragmatics
ART
Mobile handsets
mobile circumstantial network
mobile ad hoc networks
Metrics
MANET security
MANET
Loading
Learning management systems
key administration
IPsec
Internet Protocol Security (IPsec)
Cryptographic Protocols
Compositionality
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 11:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
Linguistics
Task Analysis
security of data
resilience
pubcrawl
psychology
post-hoc personality analysis
personality vulnerabilities
personality variables
personality differences
Particle measurements
Organizations
Metrics
Atmospheric measurements
learning (artificial intelligence)
insider-threat related behavior
Insider Threats
Insider Threat Detection
insider threat
industrial property
Human behavior
Games
Game-based Approach
data-driven behavioral approach
behavioral analysis
« first
‹ previous
1
2
3
4
5
6
next ›
last »