Z. Maamar, Noura Faci, Khouloud Boukadi, E. Ugljanin, M. Sellami, T. Baker, Rafael Angarita
{"title":"How to agentify the Internet-of-Things?","authors":"Z. Maamar, Noura Faci, Khouloud Boukadi, E. Ugljanin, M. Sellami, T. Baker, Rafael Angarita","doi":"10.1109/RCIS.2018.8406665","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406665","url":null,"abstract":"Despite the smooth weaving of the Internet-of-Things into people's daily lives, many challenges, such as diversity and multiplicity of things' development technologies and communication standards, and users' reluctance due to privacy invasion, are slowing down this weaving. This paper tackles the challenge of things' passive nature that has confined them into a data-supplier role. Empowering things with additional capabilities would make them proactive so, that, they can for instance, reach out to peers exposing collaborative attitude and (un)form dynamic communities when necessary. In this paper, this empowerment takes shape through thing agentification that relies on norms (specialized into business and social) to regulate the operations of things and commitments to ensure thing compliance with these norms. No-compliance would lead to sanctions over things, which should affect their credibility and reputation. A proof-of-concept and missing-child case study technically illustrate thing agentification.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic sign recognition system using feature points","authors":"Kay Thinzar Phu, L. Oo","doi":"10.1109/RCIS.2018.8406656","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406656","url":null,"abstract":"The selection of features is an important element in image processing. The important features make it possible to obtain good performances in the recognition of traffic signals. This paper presents the significant features points for traffic sign recognition. As a difficult research problem for many years, the recognition of road signs suffers from the different illuminations. The aim of the proposed research is to develop TSDR system under lighting changes in real time. This system proposes RGB color thresholding for traffic signs detection and new significant features points (crossing points, termination point and bifurcation point) are proposed. The features points are recognized with Adaptive Neuro Fuzzy Inference System (ANFIS) system. This system provides good results under sunny, cloudy, drizzle rain weather and uses Myanmar Traffic Sign dataset.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xavier Bultel, Jannik Dreier, Matthieu Giraud, M. Izaute, Timothée Kheyrkhah, P. Lafourcade, Dounia Lakhzoum, Vincent Marlin, L. Moták
{"title":"Security analysis and psychological study of authentication methods with PIN codes","authors":"Xavier Bultel, Jannik Dreier, Matthieu Giraud, M. Izaute, Timothée Kheyrkhah, P. Lafourcade, Dounia Lakhzoum, Vincent Marlin, L. Moták","doi":"10.1109/RCIS.2018.8406648","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406648","url":null,"abstract":"Touch screens have become ubiquitous in the past few years, like for instance in smartphones and tablets. These devices are often the entry door to numerous information systems, hence having a secure and practical authentication mechanism is crucial. In this paper, we examine the complexity of different authentication methods specifically designed for such devices. We study the widely spread technology to authenticate a user using a Personal Identifier Number code (PIN code). Entering the code is a critical moment where there are several possibilities for an attacker to discover the secret. We consider the three attack models: a Bruteforce Attack (BA) model, a Smudge Attack (SA) model, and an Observation Attack (OA) model where the attacker sees the user logging in on his device. The aim of the intruder is to learn the secret code. Our goal is to propose alternative methods to enter a PIN code. We compare such different methods in terms of security. Some methods require more intentional resources than other, this is why we performed a psychological study on the different methods to evaluate the users' perception of the different methods and their usage.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
George Drosatos, Fotis Nalbadis, E. Arden-Close, Victoria Baines, Elvira Bolat, L. Vuillier, Theodoros Kostoulas, S. Wasowska, M. Bonello, Jane Palles, J. McAlaney, Keith Phalp, Raian Ali
{"title":"Empowering responsible online gambling by real-time persuasive information systems","authors":"George Drosatos, Fotis Nalbadis, E. Arden-Close, Victoria Baines, Elvira Bolat, L. Vuillier, Theodoros Kostoulas, S. Wasowska, M. Bonello, Jane Palles, J. McAlaney, Keith Phalp, Raian Ali","doi":"10.1109/RCIS.2018.8406671","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406671","url":null,"abstract":"Online gambling, unlike other mediums of problem-atic and addictive behaviours, such as tobacco and alcohol, offers unprecedented opportunities for building information systems that are able to monitor and understand a user's behaviour in real-time and adapt persuasive messages and interactions that would fit their personal profile and usage context. Online gambling industry usually provides Application Programming Interfaces (APIs) meant mainly to enable third-party applications to network with their gambling services and enhance a user's gambling experience. In this industrial practice and experience paper, we advocate that such API's can also be used to retrieve gamblers' online data, such as browsing and betting history, promotions and available offers and use it to build more intel-ligent and proactive responsible gambling information systems. We report on our industrial experience in this field and make the argument that data available for persuasive marketing and usability should, under specific usage conditions, also be made available for responsible gambling information systems. This principle would provide equal opportunities for both directions. We discuss the psychological foundations of our proposed solution and the risks and challenges typically found when building such a software-assisted intervention, persuasion and emotion regulation technology. We also shed light on its potential implications from the perspectives of social corporate responsibility and data protection. We finally propose a conceptual architecture to demonstrate our vision and explain how it can be implemented. In the wider context, the paper is meant to provide insights on building behavioural awareness and regulation information systems in relation to problematic digital media usage.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eddy Ghabach, M. Blay-Fornarino, F. Khoury, B. Baz
{"title":"Clone-and-Own software product derivation based on developer preferences and cost estimation","authors":"Eddy Ghabach, M. Blay-Fornarino, F. Khoury, B. Baz","doi":"10.1109/RCIS.2018.8406682","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406682","url":null,"abstract":"Clone-and-own is a common reuse practice that is widely adopted for evolving a family of software systems. However, this practice loses its effectiveness if not supported with valuable indicators that guide the derivation of new products. In this paper, we propose an approach to support the derivation of new product variants based on clone-and-own, by providing the possible scenarios in terms of operations to perform to accomplish the derivation. We generate a constraints system prior to a product derivation, to facilitate the software engineer selection of the suitable scenario and operations based on his preferences. In addition, we propose a cost estimation for each operation and respectively for each scenario, thus, a software engineer can rely on it as an additional parameter to achieve the derivation. The proposed scenarios and cost estimation are based on indicators retrieved after an automated identification of the mappings between the features implemented by the family of software products and the assets in which they are implemented. We preliminarily validate our approach on a case study where results show that the provided support can considerably reduce the amount of time and efforts that can be required to achieve a product derivation.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125458339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards automatic translation of social network policies into controlled natural language","authors":"I. Tanoli, M. Petrocchi, R. Nicola","doi":"10.1109/RCIS.2018.8406683","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406683","url":null,"abstract":"On social networks, the storage, usage, and sharing of users data is usually regulated by privacy policies: natural language terms, in which specific actions are authorised, obliged, or denied, under some contextual conditions. Although guaranteeing degrees of readability and clarity, policies in natural language are not machine readable, thus preventing automatic controls on how the data are actually going to be used and processed by the entities that operate on them. In this paper, we propose an ontology-based approach for automatic translation of privacy statements, from natural language to a controlled natural one, to facilitate machine-readable processing. We provide a prototype implementation of the software-based translation tool, showing its effectiveness on a set of Facebook data policies.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129745899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for smart cities: Results from a systematic review of literature","authors":"M. Daneva, B. Lazarov","doi":"10.1109/RCIS.2018.8406655","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406655","url":null,"abstract":"Smart cities are gaining increasingly more importance in both research and business circles. Much effort is spent to defining what a smart city is and how it could be realized with today's or future technologies. However, from requirements engineering perspective, our knowledge of smart cities is fragmented; little is known about the requirements for smart cities as complex systems, or as systems of systems, in specific application domains. In this paper, we elicit requirements for smart city systems by carrying out a systematic review of scientific literature focused on the so-called “hard” domains of smart cities. Based on 32 selected publications, we gathered and classified requirements in respect to three types of smart city systems (instrumented, interconnected, and intelligent systems) and four classes of requirements: end-to-end experience, architectural, security, and infrastructure requirements. Our most important findings are that: (1) most authors took a bottom-up approach to defining requirements for smart cities; their efforts focused mainly on requirements important for designing an architecture that could scale up to any size and include any device or system; and (2) very little is mentioned on the newly emerging security and privacy challenges that are critical to gain the citizens' acceptance of smart city apps.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eduardo Díaz, José Ignacio Panach, Silvia Rueda, Ó. Pastor
{"title":"Towards a method to generate GUI prototypes from BPMN","authors":"Eduardo Díaz, José Ignacio Panach, Silvia Rueda, Ó. Pastor","doi":"10.1109/RCIS.2018.8406675","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406675","url":null,"abstract":"Business Process Model and Notation (BPMN) provides organizations with a standard that facilitates further compression of the business process. BPMN focuses on the functional processes, leaving the development of interfaces to one side. Thereby, interface design usually depends on the subjective experience of the analyst. This article aims to propose a new method to generate user interfaces from BPMN models and Class Diagrams. The proposed method is based on the identification of different rules and makes use of stereotypes to extend BPMN notation. The rules have been extracted from seven existing projects on the Bizagi repository. Specifically, the proposal is based on the extraction of rules for generating user interfaces based on three widely used patterns: sequence pattern, exclusive decision pattern and synchronization pattern. As a result of our proposal, eleven new stereotypes have been added to BPMN notation. These stereotypes allow generating interfaces based on business process models. For a better understanding, the proposed stereotypes have been applied to an illustrative example. The results show that this work is a “step forward to” the automatic code generation from models.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a framework of techniques for enabling semantics-driven secondary notation in conceptual models","authors":"Ana-Maria Ghiran, R. Buchmann, D. Karagiannis","doi":"10.1109/RCIS.2018.8406684","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406684","url":null,"abstract":"Regardless whether a standard language or a domain-specific one is employed for enterprise modelling, during modelling activities the interaction between the user and the modelling environment is not limited anymore to a static canvas. Consequently, notations that have been designed on the basis of semiotic principles under the assumption of a static 2D “drawing surface” (not necessarily software) can nowadays be subjected to automated enhancements commonly known as “secondary notation”. This is a form of notational variability that allows prescribed deviations from a default (possibly standard) static notation. It is commonly provided in programming environments, with the goal of highlighting elements or to change notation in order to reveal some semantic or contextual aspect. We investigate several layers on which this variability can be ensured in modelling environments, considering the building blocks of a modelling method artefact, and propose a set of techniques that could inspire a framework on semantics-notation dependencies and could be adopted as requirements for next-generation meta-modelling platforms that would adopt secondary notation as a first-class concern rather than as an afterthought for ornamental purposes.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APPLIES: A framework for evaluAting organization's motivation and preparation for adopting product lines","authors":"Luisa Rincón, R. Mazo, C. Salinesi","doi":"10.1109/RCIS.2018.8406641","DOIUrl":"https://doi.org/10.1109/RCIS.2018.8406641","url":null,"abstract":"In the software industry, product Lines has emerged as an attractive approach to perform planned reuse. Nevertheless, a product line solution is not appropriate for all the cases and requires some conditions to be implemented successfully. The literature offers several contributions regarding the adoption of product lines. However, only a few of these support decision-makers for taking well-informed decisions in favor or against following this approach. This paper presents APPLIES, a framework to (i) detect signals that could motivate an organization to adopt a product line approach (ii) assess to what extent a company is prepared for supporting the practices necessary to adopt a product line. APPLIES is grounded in a thematic analysis of the literature and was preliminarily evaluated with two experts through a survey and an interview. The results of the evaluation provide us insights to create an improved version of the proposal following a design-science method.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130762624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}