Review
Computer Science, Information Systems
Siaw-Teng Liaw, Myron Anthony Godinho
Summary: This study provides a literature review on capability maturity models (MMs) for the implementation and evaluation of digital health (DH) ecosystems. It identifies diverse domain-specific MMs and their development, implementation, and evaluation methods. The study also introduces a new category of community-facing MMs. The conclusion suggests using a metamodel like DHPMAT-MM to unify domain-specific MMs and guide the overall implementation and evaluation of DH ecosystems.
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION
(2023)
Review
Computer Science, Cybernetics
Marco Saltarella, Giuseppe Desolda, Rosa Lanzilotti, Vita Santa Barletta
Summary: The study addresses the importance of considering privacy principles in software development and the lack of practical guidance from data protection regulations. It provides insights into how privacy principles translate into software requirements and how they integrate into a Human-Centred Design process.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION
(2023)
Review
Business
Vera-Line Montreuil
Summary: This paper aims to provide an in-depth synthesis of the evidence on organizational change capability (OCC) and address the ambiguity surrounding this construct. Through a literature review, it is found that change capacity, change capability, and change competency are not synonymous terms. The limitation of the research lies in its focus on the past two decades and it proposes a change maturity framework to guide further investigations.
MANAGEMENT DECISION
(2023)
Review
Green & Sustainable Science & Technology
Emilio Rossi, Erminia Attaianese
Summary: This study conducts a systematic literature review to identify and describe the main themes in the integrated research area of sustainability and HCD. The findings provide future research trajectories for applied research and practice on sustainable HCD connected to the SDGs. The study highlights four principal design areas: health and wealth, education, industrial innovation, and built environment and living communities.
Review
Engineering, Aerospace
Guoqing Wang, Min Li, Miao Wang, Dongjin Ding
Summary: This paper provides a systematic review of the progress of the Human-Centered Design (HCD) approach in Single Pilot Operations (SPO) research. The development, application, and research process of HCD approach were introduced, and the progress in SPO research was reviewed from the perspectives of concept design, function allocation, and system evaluation. The limitations of current SPO research and future research directions for applying the HCD approach to SPO were also discussed.
CHINESE JOURNAL OF AERONAUTICS
(2023)
Review
Health Care Sciences & Services
Zethapong Nimmanterdwong, Suchaya Boonviriya, Pisit Tangkijvanich
Summary: This systematic review explores the use of human-centered design (HCD) in creating mHealth solutions for older adults. The results indicate that HCD can lead to positive outcomes in providing mHealth solutions for older adults. However, the limited evidence suggests the need for more research with measurable design goals and rigorous research strategies.
JMIR MHEALTH AND UHEALTH
(2022)
Article
Computer Science, Interdisciplinary Applications
Ebru Gokalp, Veronica Martinez
Summary: The Digital Transformation Capability Maturity Model (DX-CMM) is designed to assist organizations by providing a comprehensive roadmap to determine their current DX capability level, conduct gap analysis, and provide improvement suggestions. Case study results in the chemical and machine manufacturing domains demonstrate that the DX-CMM is effective in identifying DX maturity levels and providing improvement roadmaps, as well as benchmarking organizations against each other using the same approach.
COMPUTERS IN INDUSTRY
(2021)
Review
Engineering, Industrial
Franziska Hein-Pensel, Heiner Winkler, Anja Brueckner, Mandy Woelke, Iren Jabs, Ines Jasmin Mayan, Amit Kirschenbaum, Julia Friedrich, Christian Zinke-Wehlmann
Summary: With the introduction of Industry 5.0, a shift towards social and ecological objectives is planned, in addition to economic ones. The complexity of digitalization increases as direct collaboration between humans and machines is implemented. For SMEs, who have limited resources, maturity models (MMs) are valuable tools for successful digitalization strategy implementation.
JOURNAL OF MANUFACTURING SYSTEMS
(2023)
Review
Computer Science, Artificial Intelligence
M. Gimenez-Medina, J. G. Enriquez, F. J. Dominguez-Mayo
Summary: This paper explores the current state of capability and maturity innovation assessment models in the context of Information and Communication Technologies. Based on a systematic mapping study, it identifies gaps and challenges in the existing research, including the lack of a common ontology, limited focus on innovation management systems, and the inadequate incorporation of all Quadruple Helix stakeholders through open innovation concepts.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Meng Chun Lam, Siti Soleha Muhammad Nizam, Haslina Arshad, Nur Afyfah Suwadi
Summary: Augmented reality (AR) technology allows users to view and interact with virtual information in real-time. Existing tangible interaction techniques in the context of kitchen design enable manipulation of virtual furniture, but require additional devices. This study aims to develop an AR tangible interaction technique on a mobile platform with authoring capabilities for kitchen design. The technique recorded faster task completion time and higher usability compared to the basic interaction technique, with younger and experienced users performing better. Gender did not impact the interaction technique.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Interdisciplinary Applications
Fabio Grandi, Elisa Prati, Margherita Peruzzini, Marcello Pellicciari, Claudia Elisabetta Campanella
Summary: Designing highly usable and ergonomic dashboards for vehicles is crucial to support users in managing complex machines. The study proposes an innovative methodology combining virtual simulations with human performance analysis to optimize design, resulting in improved comfort, usability, visibility, accessibility and performance. The multidisciplinary approach demonstrates the potential for design optimization through user information integration.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2022)
Article
Computer Science, Interdisciplinary Applications
Alessandra Papetti, Marianna Ciccarelli, Cecilia Scoccia, Giacomo Palmieri, Michele Germani
Summary: This study proposes a method to support manufacturing engineers in the human-oriented design process, aiming to achieve satisfactory performance in customization production without compromising worker safety and health. The method defines design criteria, considers different design alternatives, and guides the selection of appropriate design choices based on their dynamic impact on various elements of the system.
INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING
(2022)
Review
Computer Science, Information Systems
Lorans Alabood, Zahra Aminolroaya, Dianna Yim, Omar Addam, Frank Maurer
Summary: The Design Critique (DC) method is increasingly used in Human-Computer Interaction (HCI) and User Experience (UX) studies. This paper provides an overview of the DC method in the UX field and proposes a generic DC process. Three different trends of DC processes are identified and a 10-step generic process is proposed.
INFORMATION AND SOFTWARE TECHNOLOGY
(2023)
Review
Computer Science, Information Systems
Mohamed Noordin Yusuff Marican, Shukor Abd Razak, Ali Selamat, Siti Hajar Othman
Summary: Cybersecurity has become increasingly important for firms due to the rise of cyber-attacks, particularly for technology startups that lack cyber security measures. These startups may serve as entry points for hackers to access large organizations, as they often have network connections and store confidential information. However, there is a lack of comprehensive cyber security maturity assessment frameworks specifically designed for technology startups, hindering their ability to measure and justify their security investments.
Article
Public, Environmental & Occupational Health
Shirley D. Yan, Joann Simpson, Lyndsey Mitchum, Jennifer Orkis, TrishAnn Davis, Sean Wilson, Neil Trotman, Helen Imhoff, Horace Cox, Gabrielle Hunter, Bolanle Olapeju, Camille Adams, J. Douglas Storey
Summary: Malaria remains a persistent public health challenge among miners in Guyana's hinterland, making it difficult for them to access timely Ministry of Health-approved malaria testing and treatment services. By using a human-centered design process, an interdisciplinary team developed innovative solutions including a social behavior change campaign, rapid counseling cards, branded malaria testing and treatment services, to address the issue effectively.
Article
Computer Science, Hardware & Architecture
Mengqi Feng, Chao Lin, Wei Wu, Debiao He
Summary: Digital signature provides resistance against information tampering and identity impersonation, but lacks specific anonymity requirement for scenarios such as voting and whistle-blowing. Ring signature was introduced for achieving anonymity, but existing schemes face size limitations. In this paper, a novel construction paradigm called DualRing is proposed for logarithmic-sized ring signature. The SM2 digital signature is transformed into Type-T and integrated with DualRing technology, proving unforgeability and anonymity. Optimized and linkable schemes are proposed, and the performance in communication and computation costs are demonstrated.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
B. Meenakshi, D. Karunkuzhali
Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Jose Luis de la Vara, Hector Bahamonde, Clara Ayora
Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Ruben Grande, Aurora Vizcaino, Felix O. Garcia
Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li
Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian
Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
A. Noorian
Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret
Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Leixiao Cheng, Jing Qin, Fei Meng
Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen
Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang
Summary: This paper proposes a lightweight delegated PSI-CA protocol based on multi-point oblivious pseudorandom function and collision-resistant hash function, and utilizes it to build a privacy-preserving contact tracing system. Experimental results show that our system is more practical and advantageous for densely populated areas.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang
Summary: Ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts in the face of growing threats to data security. The advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve these problems by providing satisfying anti-quantum computing security and resisting OMRA attacks. This paper presents a lattice-based PKE-DET scheme that supports delegated tester function and demonstrates security under the LWE hardness assumption in the standard model. The scheme offers advantages such as high security, delegated tester authorization, and small storage space compared to existing schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang
Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Hardware & Architecture
Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li
Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.
COMPUTER STANDARDS & INTERFACES
(2024)