首页 > 最新文献

Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization最新文献

英文 中文
Embedding Knowledge Graphs for Semantics-aware Recommendations based on DBpedia 基于DBpedia的语义感知推荐嵌入知识图
C. Musto, Pierpaolo Basile, G. Semeraro
In this paper we present a semantics-aware recommendation strategy that uses graph embedding techniques to learn a vector space reresentation of the items to be recommended. Such a representation relies on the tripartite graph which connects users, items and entities gathered from DBpedia, thus it encodes both collaborative and content-based information. These embeddings are then used to feed with positive and negative examples (the items the user liked and those she did not like) a classification model, which is finally exploited to classify new items as interesting or not interesting for the target user. In the experimental evaluation we evaluate the effectiveness of our method on varying of different graph embedding techniques and on several topologies of the graph. Results show that the embeddings learnt by combining collaborative data points with the information gathered from DBpedia led to the best results and also beat several state-of-the-art techniques.
在本文中,我们提出了一种语义感知的推荐策略,该策略使用图嵌入技术来学习要推荐的项目的向量空间表示。这种表示依赖于连接从DBpedia收集的用户、项目和实体的三方图,因此它既编码协作信息,也编码基于内容的信息。然后使用这些嵌入来提供积极和消极的例子(用户喜欢和不喜欢的项目)分类模型,最终利用该模型将新项目分类为目标用户感兴趣或不感兴趣。在实验评估中,我们评估了我们的方法在不同的图嵌入技术和图的几种拓扑上的有效性。结果表明,通过将协作数据点与从DBpedia收集的信息相结合来学习的嵌入产生了最好的结果,并且也击败了一些最先进的技术。
{"title":"Embedding Knowledge Graphs for Semantics-aware Recommendations based on DBpedia","authors":"C. Musto, Pierpaolo Basile, G. Semeraro","doi":"10.1145/3314183.3324976","DOIUrl":"https://doi.org/10.1145/3314183.3324976","url":null,"abstract":"In this paper we present a semantics-aware recommendation strategy that uses graph embedding techniques to learn a vector space reresentation of the items to be recommended. Such a representation relies on the tripartite graph which connects users, items and entities gathered from DBpedia, thus it encodes both collaborative and content-based information. These embeddings are then used to feed with positive and negative examples (the items the user liked and those she did not like) a classification model, which is finally exploited to classify new items as interesting or not interesting for the target user. In the experimental evaluation we evaluate the effectiveness of our method on varying of different graph embedding techniques and on several topologies of the graph. Results show that the embeddings learnt by combining collaborative data points with the information gathered from DBpedia led to the best results and also beat several state-of-the-art techniques.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process 迈向设计先进的密码破解工具包:优化密码破解过程
P. Jourdan, Eliana Stavrou
Passwords are still a widespread authentication mechanism that, despite the efforts of the cybersecurity community to educate people, are often predictable. Therefore, there is a need for defenders, e.g. cybersecurity/IT administrators, to periodically assess the users' passwords in their organization, improve their awareness on the security level and take measures to improve the situation. Password cracking can assist in the evaluation of the strength of passwords and a variety of tools exist to execute it. The challenge with this is that it is a time-consuming process and it needs to be optimized to detect weak passwords within a specific evaluation timeframe. To optimize the process, knowledge in the area and appropriate tools are required. However, even though a lot of research is performed in this area, the knowledge and tools are scarce, challenging defenders' tasks. Therefore, the need arises to promote the design of advanced tools, integrating existing user knowledge and creating powerful toolkits. This work presents the design of UPAT (Ultimate Password Awareness Toolkit), which specifies essential features to optimize the password cracking process. The evaluation results are encouraging as to the tool's effectiveness and users' satisfaction, demonstrating the importance of designing next generation password cracking toolkits to enhance the security of communication and information systems.
密码仍然是一种广泛使用的认证机制,尽管网络安全社区努力教育人们,但密码通常是可以预测的。因此,防御者(例如网络安全/IT管理员)需要定期评估其组织内用户的密码,提高他们对安全级别的认识,并采取措施改善情况。密码破解可以帮助评估密码的强度,并且存在各种工具来执行它。这样做的挑战在于,这是一个耗时的过程,并且需要对其进行优化,以便在特定的评估时间范围内检测弱密码。为了优化流程,需要该领域的知识和适当的工具。然而,尽管在这一领域进行了大量的研究,但知识和工具却很少,这给防御者的任务带来了挑战。因此,需要促进高级工具的设计,集成现有的用户知识并创建强大的工具包。这项工作提出了UPAT(终极密码感知工具包)的设计,它指定了优化密码破解过程的基本功能。评估结果显示,该工具的有效性和用户满意度令人鼓舞,显示了设计下一代密码破解工具包对提高通信和信息系统安全性的重要性。
{"title":"Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process","authors":"P. Jourdan, Eliana Stavrou","doi":"10.1145/3314183.3324967","DOIUrl":"https://doi.org/10.1145/3314183.3324967","url":null,"abstract":"Passwords are still a widespread authentication mechanism that, despite the efforts of the cybersecurity community to educate people, are often predictable. Therefore, there is a need for defenders, e.g. cybersecurity/IT administrators, to periodically assess the users' passwords in their organization, improve their awareness on the security level and take measures to improve the situation. Password cracking can assist in the evaluation of the strength of passwords and a variety of tools exist to execute it. The challenge with this is that it is a time-consuming process and it needs to be optimized to detect weak passwords within a specific evaluation timeframe. To optimize the process, knowledge in the area and appropriate tools are required. However, even though a lot of research is performed in this area, the knowledge and tools are scarce, challenging defenders' tasks. Therefore, the need arises to promote the design of advanced tools, integrating existing user knowledge and creating powerful toolkits. This work presents the design of UPAT (Ultimate Password Awareness Toolkit), which specifies essential features to optimize the password cracking process. The evaluation results are encouraging as to the tool's effectiveness and users' satisfaction, demonstrating the importance of designing next generation password cracking toolkits to enhance the security of communication and information systems.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimentation Pitfalls to Avoid in A/B Testing for Online Personalization 在线个性化A/B测试中应避免的实验陷阱
Maria Esteller-Cucala, Vicenc Fernandez, Diego Villuendas
Online controlled experiments (also called A/B tests, bucket testing or randomized experiments) have become an habitual practice in numerous companies for measuring the impact of new features and changes deployed to softwares products. In theory, these experiments are one of the simplest methods to evaluate the potential effects that new features have on user's behavior. In practice, however, there are many pitfalls that can obscure the interpretation of results or induce invalid conclusions. There is, in the literature, no shortage of prior work on online controlled experiments addressing these pitfalls and conclusions misinterpretations, but the topic is not tackled considering the specific case of testing personalization features. In this paper, we present some of the experimentation pitfalls that are particularly important for personalization features. To better illustrate each pitfall, we include a combination of theoretical argumentation as well as examples from real company's experiments. While there is clearly value in evaluating personalized features by means of online controlled experiments, there are some pitfalls to bear in mind while testing. With this paper, we aim to increase the experimenters' awareness of leading to improved quality and reliability of the results.
在线控制实验(也称为A/B测试、桶测试或随机实验)已经成为许多公司衡量新特性和部署到软件产品的更改的影响的习惯做法。理论上,这些实验是评估新功能对用户行为的潜在影响的最简单方法之一。然而,在实践中,有许多陷阱可以模糊对结果的解释或得出无效的结论。在文献中,不乏针对这些陷阱和结论误解的在线控制实验的先前工作,但考虑到测试个性化特征的具体情况,该主题没有得到解决。在本文中,我们提出了一些对个性化特征特别重要的实验陷阱。为了更好地说明每个陷阱,我们结合了理论论证和来自真实公司实验的例子。虽然通过在线控制实验来评估个性化特征显然是有价值的,但在测试时要记住一些陷阱。通过本文,我们旨在提高实验人员的意识,从而提高结果的质量和可靠性。
{"title":"Experimentation Pitfalls to Avoid in A/B Testing for Online Personalization","authors":"Maria Esteller-Cucala, Vicenc Fernandez, Diego Villuendas","doi":"10.1145/3314183.3323853","DOIUrl":"https://doi.org/10.1145/3314183.3323853","url":null,"abstract":"Online controlled experiments (also called A/B tests, bucket testing or randomized experiments) have become an habitual practice in numerous companies for measuring the impact of new features and changes deployed to softwares products. In theory, these experiments are one of the simplest methods to evaluate the potential effects that new features have on user's behavior. In practice, however, there are many pitfalls that can obscure the interpretation of results or induce invalid conclusions. There is, in the literature, no shortage of prior work on online controlled experiments addressing these pitfalls and conclusions misinterpretations, but the topic is not tackled considering the specific case of testing personalization features. In this paper, we present some of the experimentation pitfalls that are particularly important for personalization features. To better illustrate each pitfall, we include a combination of theoretical argumentation as well as examples from real company's experiments. While there is clearly value in evaluating personalized features by means of online controlled experiments, there are some pitfalls to bear in mind while testing. With this paper, we aim to increase the experimenters' awareness of leading to improved quality and reliability of the results.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy Issues in Holistic Recommendations 整体建议中的隐私问题
F. Cena, R. Pensa, A. Rapp
In this paper we point out some relevant issues in relation to privacy when providing holistic recommendations. We emphasize that a holistic recommender should be fair, explainable and privacy-preserving to ensure the ethicality of the recommendation process. Further, we point out relevant research questions that should be addressed in the future, as well as propose some preliminary suggestions to face the emergent issues with reference to privacy in the recommendation domain.
本文在提供整体建议的同时,指出了与隐私相关的一些问题。我们强调,一个全面的推荐应该是公平的,可解释的和隐私保护,以确保推荐过程的道德。进一步指出了未来需要解决的相关研究问题,并针对推荐领域中出现的隐私问题提出了一些初步建议。
{"title":"Privacy Issues in Holistic Recommendations","authors":"F. Cena, R. Pensa, A. Rapp","doi":"10.1145/3314183.3323461","DOIUrl":"https://doi.org/10.1145/3314183.3323461","url":null,"abstract":"In this paper we point out some relevant issues in relation to privacy when providing holistic recommendations. We emphasize that a holistic recommender should be fair, explainable and privacy-preserving to ensure the ethicality of the recommendation process. Further, we point out relevant research questions that should be addressed in the future, as well as propose some preliminary suggestions to face the emergent issues with reference to privacy in the recommendation domain.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explaining Need-based Educational Recommendations Using Interactive Open Learner Models 使用互动式开放式学习者模型解释基于需求的教育建议
Jordan Barria-Pineda, Kamil Akhuseyinoglu, Peter Brusilovsky
Students might pursue different goals throughout their learning process. For example, they might be seeking new material to expand their current level of knowledge, repeating content of prior classes to prepare for an exam, or working on addressing their most recent misconceptions. Multiple potential goals require an adaptive e-learning system to recommend learning content appropriate for students' intent and to explain this recommendation in the context of this goal. In our prior work, we explored explainable recommendations for the most typical 'knowledge expansion goal". In this paper, we focus on students' immediate needs to remedy misunderstandings when they solve programming problems. We generate learning content recommendations to target the concepts with which students have struggled more recently. At the same time, we produce explanations for this recommendation goal in order to support students' understanding of why certain learning activities are recommended. The paper provides an overview of the design of this explainable educational recommender system and describes its ongoing evaluation
学生在整个学习过程中可能会追求不同的目标。例如,他们可能会寻找新的材料来扩展他们目前的知识水平,重复以前课程的内容来准备考试,或者努力解决他们最近的误解。多个潜在的目标需要一个自适应的电子学习系统来推荐适合学生意图的学习内容,并在这个目标的上下文中解释这个建议。在我们之前的工作中,我们探索了最典型的“知识扩展目标”的可解释建议。在本文中,我们关注学生在解决编程问题时纠正误解的直接需求。我们生成学习内容建议,以针对学生最近挣扎的概念。同时,我们对这个推荐目标进行了解释,以支持学生理解为什么推荐某些学习活动。本文概述了这种可解释的教育推荐系统的设计,并描述了其正在进行的评估
{"title":"Explaining Need-based Educational Recommendations Using Interactive Open Learner Models","authors":"Jordan Barria-Pineda, Kamil Akhuseyinoglu, Peter Brusilovsky","doi":"10.1145/3314183.3323463","DOIUrl":"https://doi.org/10.1145/3314183.3323463","url":null,"abstract":"Students might pursue different goals throughout their learning process. For example, they might be seeking new material to expand their current level of knowledge, repeating content of prior classes to prepare for an exam, or working on addressing their most recent misconceptions. Multiple potential goals require an adaptive e-learning system to recommend learning content appropriate for students' intent and to explain this recommendation in the context of this goal. In our prior work, we explored explainable recommendations for the most typical 'knowledge expansion goal\". In this paper, we focus on students' immediate needs to remedy misunderstandings when they solve programming problems. We generate learning content recommendations to target the concepts with which students have struggled more recently. At the same time, we produce explanations for this recommendation goal in order to support students' understanding of why certain learning activities are recommended. The paper provides an overview of the design of this explainable educational recommender system and describes its ongoing evaluation","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125193626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Tag-Based User Profiling: A Game Theoretic Approach 基于标签的用户分析:一种博弈论方法
G. Faggioli, Mirko Polato, F. Aiolli
As already pointed out by a constantly growing literature, explainability in recommender systems field is a key aspect to increase users' satisfaction. With the increase of user generated content, tags have proven to be highly relevant when it comes to describe either users or items. A number of strategies that rely on tags have been proposed, yet, many of these algorithms exploit the frequency of user-tags interactions to gain information. We argue that a pure frequentist description might lack of specificity to grasp user's peculiar tastes. Therefore, we propose a novel approach based on game theory that tries to find the best trade-off between generality and detailing. The identified user's description can be used to keep her in the loop and allows the user to have control over system's knowledge. Additionally, we propose a user interface that embeds the proposed user's description and it can be used by the user herself to guide her catalogue's exploration toward novel and serendipitous items.
正如越来越多的文献所指出的那样,推荐系统领域的可解释性是提高用户满意度的一个关键方面。随着用户生成内容的增加,标签在描述用户或项目时被证明是高度相关的。已经提出了许多依赖于标签的策略,然而,许多这些算法利用用户-标签交互的频率来获取信息。我们认为,纯粹的频率描述可能缺乏特异性,无法把握用户的特殊口味。因此,我们提出了一种基于博弈论的新方法,试图在一般性和细节之间找到最佳权衡。已识别的用户的描述可用于使其保持在循环中,并允许用户控制系统的知识。此外,我们提出了一个用户界面,嵌入用户的描述,它可以被用户自己使用,以指导她的目录探索新颖和偶然的项目。
{"title":"Tag-Based User Profiling: A Game Theoretic Approach","authors":"G. Faggioli, Mirko Polato, F. Aiolli","doi":"10.1145/3314183.3323462","DOIUrl":"https://doi.org/10.1145/3314183.3323462","url":null,"abstract":"As already pointed out by a constantly growing literature, explainability in recommender systems field is a key aspect to increase users' satisfaction. With the increase of user generated content, tags have proven to be highly relevant when it comes to describe either users or items. A number of strategies that rely on tags have been proposed, yet, many of these algorithms exploit the frequency of user-tags interactions to gain information. We argue that a pure frequentist description might lack of specificity to grasp user's peculiar tastes. Therefore, we propose a novel approach based on game theory that tries to find the best trade-off between generality and detailing. The identified user's description can be used to keep her in the loop and allows the user to have control over system's knowledge. Additionally, we propose a user interface that embeds the proposed user's description and it can be used by the user herself to guide her catalogue's exploration toward novel and serendipitous items.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Driving Persuasive Games with Personal EEG Devices: Strengths and Weaknesses 用个人脑电图设备驱动说服性游戏:优势和劣势
Chinenye Ndulue, Rita Orji
Recovering from Stroke can be a very long and stressful process. It may involve several months or years of exercise and other medical routines that could be both painful and uninteresting. Most people suffering from stroke tend to lose their basic motor functions and it may take a series of exercises to gain back their full manual dexterity. There is a need for a variety of interventions to make these exercises engaging and exciting, to ease the burden of stroke rehabilitation. This paper explores the possibility of using portable personal electroencephalogram (EEG) devices with persuasive games as a tool for stroke rehabilitation. It looks at the major limitations and strengths of using personal Brain-Computer Interfaces (BCIs) for stroke rehabilitation. The paper also presents the design and development of a Brain-Computer Interface persuasive game called Rock Evaders, that aims to motivate people recovering from stroke to carry out their rehabilitation exercises in an exciting and engaging way.
从中风中恢复可能是一个非常漫长和紧张的过程。这可能需要几个月或几年的锻炼,以及其他既痛苦又无趣的医疗常规。大多数患中风的人往往会失去基本的运动功能,可能需要一系列的锻炼才能恢复他们完全的手灵巧性。有必要采取各种干预措施,使这些运动具有吸引力和令人兴奋,以减轻中风康复的负担。本文探讨了使用便携式个人脑电图(EEG)设备作为中风康复工具的可能性。它着眼于使用个人脑机接口(bci)进行中风康复的主要局限性和优势。这篇论文还介绍了一款名为Rock Evaders的脑机接口劝说游戏的设计和开发,该游戏旨在激励中风患者以一种令人兴奋和吸引人的方式进行康复训练。
{"title":"Driving Persuasive Games with Personal EEG Devices: Strengths and Weaknesses","authors":"Chinenye Ndulue, Rita Orji","doi":"10.1145/3314183.3325008","DOIUrl":"https://doi.org/10.1145/3314183.3325008","url":null,"abstract":"Recovering from Stroke can be a very long and stressful process. It may involve several months or years of exercise and other medical routines that could be both painful and uninteresting. Most people suffering from stroke tend to lose their basic motor functions and it may take a series of exercises to gain back their full manual dexterity. There is a need for a variety of interventions to make these exercises engaging and exciting, to ease the burden of stroke rehabilitation. This paper explores the possibility of using portable personal electroencephalogram (EEG) devices with persuasive games as a tool for stroke rehabilitation. It looks at the major limitations and strengths of using personal Brain-Computer Interfaces (BCIs) for stroke rehabilitation. The paper also presents the design and development of a Brain-Computer Interface persuasive game called Rock Evaders, that aims to motivate people recovering from stroke to carry out their rehabilitation exercises in an exciting and engaging way.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"22 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Shedding Light on Mobile App Store Censorship 分析手机应用商店审查制度
Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
This paper studies the availability of apps and app stores across countries. Our research finds that users in specific countries do not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit foreign businesses to operate within its jurisdiction. Furthermore, this paper presents a novel methodology for querying the public search engines and APIs of major app stores (Google Play Store, Apple App Store, Tencent MyApp Store) that is cross-verified by network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the availability of VPN apps in Russia and China. Our results show that despite both countries having restrictive VPN laws, there are still many VPN apps available in Russia and only a handful in China. In addition, we have included findings of a global search for the availability of privacy-enhancing and other apps that are known to be censored. Finally, we observe that it is difficult to find out which apps have been removed or are unavailable on the examined app stores. As a consequence, we urge all app store providers to introduce app store transparency reports, which would include when apps were removed and for what reasons.
本文研究了各国应用程序和应用商店的可用性。我们的研究发现,某些国家的用户由于当地法律、经济原因或某些国家被列入禁止外国企业在其管辖范围内运营的制裁名单而无法访问热门应用商店。此外,本文提出了一种新的方法,用于查询主要应用商店(Google Play Store, Apple app Store, Tencent MyApp Store)的公共搜索引擎和api,该方法通过网络测量进行交叉验证。这使我们能够调查哪些应用程序在哪个国家可用。我们主要关注的是俄罗斯和中国VPN应用的可用性。我们的研究结果显示,尽管这两个国家都有严格的VPN法律,但俄罗斯仍然有许多VPN应用程序可用,而中国只有少数VPN应用程序可用。此外,我们还在全球范围内搜索了隐私增强和其他已知受到审查的应用程序的可用性。最后,我们观察到很难发现哪些应用已经被删除或在被检查的应用商店中不可用。因此,我们敦促所有应用商店供应商引入应用商店透明度报告,其中包括应用程序何时被删除以及出于何种原因。
{"title":"Shedding Light on Mobile App Store Censorship","authors":"Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian","doi":"10.1145/3314183.3324965","DOIUrl":"https://doi.org/10.1145/3314183.3324965","url":null,"abstract":"This paper studies the availability of apps and app stores across countries. Our research finds that users in specific countries do not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit foreign businesses to operate within its jurisdiction. Furthermore, this paper presents a novel methodology for querying the public search engines and APIs of major app stores (Google Play Store, Apple App Store, Tencent MyApp Store) that is cross-verified by network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the availability of VPN apps in Russia and China. Our results show that despite both countries having restrictive VPN laws, there are still many VPN apps available in Russia and only a handful in China. In addition, we have included findings of a global search for the availability of privacy-enhancing and other apps that are known to be censored. Finally, we observe that it is difficult to find out which apps have been removed or are unavailable on the examined app stores. As a consequence, we urge all app store providers to introduce app store transparency reports, which would include when apps were removed and for what reasons.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131231457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the Personalization of Image Content in Graphical Passwords based on Users' Sociocultural Experiences: New Challenges and Opportunities 基于用户社会文化体验的图形密码图像内容个性化:新的挑战与机遇
Argyris Constantinides, C. Fidas, Marios Belk, A. Pitsillides
Recent works underpin the added value of considering users' past sociocultural experiences as a personalization factor for the image content used within graphical password schemes, since it has a positive impact on the security and memorability of the user-chosen passwords. This paper discusses the need for personalization of the image content used in graphical password schemes, as well as the initial steps towards the realization of an image content personalization framework that aims to achieve a better equilibrium between security and memorability. The paper also discusses emerging challenges related to the elicitation and maintenance of individual sociocultural-centered user models, the image content personalization mechanism and privacy considerations.
最近的工作支持将用户过去的社会文化经验作为图形密码方案中使用的图像内容的个性化因素的附加价值,因为它对用户选择的密码的安全性和可记忆性有积极影响。本文讨论了图形密码方案中使用的图像内容个性化的需求,以及实现图像内容个性化框架的初步步骤,该框架旨在实现安全性和可记忆性之间的更好平衡。本文还讨论了与以个人社会文化为中心的用户模型的启发和维护、图像内容个性化机制和隐私考虑相关的新挑战。
{"title":"On the Personalization of Image Content in Graphical Passwords based on Users' Sociocultural Experiences: New Challenges and Opportunities","authors":"Argyris Constantinides, C. Fidas, Marios Belk, A. Pitsillides","doi":"10.1145/3314183.3324966","DOIUrl":"https://doi.org/10.1145/3314183.3324966","url":null,"abstract":"Recent works underpin the added value of considering users' past sociocultural experiences as a personalization factor for the image content used within graphical password schemes, since it has a positive impact on the security and memorability of the user-chosen passwords. This paper discusses the need for personalization of the image content used in graphical password schemes, as well as the initial steps towards the realization of an image content personalization framework that aims to achieve a better equilibrium between security and memorability. The paper also discusses emerging challenges related to the elicitation and maintenance of individual sociocultural-centered user models, the image content personalization mechanism and privacy considerations.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Objective Indicators of Users' Cognitive Load During Proactive In-Car Dialogs 主动车内对话中用户认知负荷的客观指标评估
Maria Schmidt, David Helbig, Ojashree Bhandare, D. Stier, W. Minker, S. Werner
Using Personal Assistants (PAs) via voice becomes increasingly usual as more and more devices in different environments offer this capability, such as Google Assistant, Amazon Alexa, Apple Siri, Microsoft Cortana, Mercedes-Benz MBUX or BMW Intelligent Personal Assistant. PAs help users to set reminders, find their way through traffic, or send messages to friends and colleagues. While serving the users' needs, PAs constantly collect personal data in order to personalize their services and adapt their behavior. In order to find out which objective Cognitive Load (CL) indicators reflect the users' perception of proactive system behavior in six specific use cases of an in-car PA, we conducted a Wizard of Oz study in a driving simulator with 42 participants. We varied traffic density and tracked physiological data, such as heart rate (HR) and electrodermal activity (EDA). We assessed the users' CL during the interaction with the PA by employing these data as well as real-time driving data (RTDA) via the Controller Area Network (CAN bus). The results show that physiological data like HR and EDA are not suitable to be used as indicators for the users' CL in this experiment. This is because the tracked physiological data do not show significant differences with respect to different traffic densities or proactivity. At the same time it has to be discussed whether the used type of recording physiological data is robust enough for our purposes. Concerning driving data, only the acceleration parameter showed a tendency towards differences between age groups, though insignificantly. The same is valid for the steering angle parameter when comparing male and female users. For future work, we plan to additionally evaluate subjective CL measures and other ratings to see whether these show more significant differences between the (non-)proactive assistants, traffic densities, or use cases.
随着越来越多的设备在不同的环境中提供这种功能,通过语音使用个人助理(PAs)变得越来越普遍,比如谷歌助理、亚马逊Alexa、苹果Siri、微软小娜、梅赛德斯-奔驰MBUX或宝马智能个人助理。pa可以帮助用户设置提醒,在交通中找到自己的路,或者向朋友和同事发送消息。在满足用户需求的同时,认证机构不断收集个人数据,以提供个性化的服务和适应用户的行为。为了找出哪些客观认知负荷(CL)指标反映了用户在车载PA的六个特定用例中对主动系统行为的感知,我们在驾驶模拟器中进行了42名参与者的绿野仙踪研究。我们改变了交通密度,并跟踪了生理数据,如心率(HR)和皮电活动(EDA)。通过使用这些数据以及通过控制器局域网(CAN总线)的实时驾驶数据(RTDA),我们评估了用户在与PA交互过程中的CL。结果表明,HR和EDA等生理数据不适合作为本实验中用户CL的指标。这是因为跟踪的生理数据在不同的交通密度或主动性方面没有显示出显着差异。与此同时,必须讨论所使用的记录生理数据的类型是否足以满足我们的目的。在驾驶数据方面,只有加速度参数表现出年龄组间差异的趋势,但差异不显著。在比较男性和女性用户时,转向角参数也是如此。对于未来的工作,我们计划额外评估主观CL度量和其他评级,以查看这些是否在(非)主动助手、交通密度或用例之间显示出更显著的差异。
{"title":"Assessing Objective Indicators of Users' Cognitive Load During Proactive In-Car Dialogs","authors":"Maria Schmidt, David Helbig, Ojashree Bhandare, D. Stier, W. Minker, S. Werner","doi":"10.1145/3314183.3324985","DOIUrl":"https://doi.org/10.1145/3314183.3324985","url":null,"abstract":"Using Personal Assistants (PAs) via voice becomes increasingly usual as more and more devices in different environments offer this capability, such as Google Assistant, Amazon Alexa, Apple Siri, Microsoft Cortana, Mercedes-Benz MBUX or BMW Intelligent Personal Assistant. PAs help users to set reminders, find their way through traffic, or send messages to friends and colleagues. While serving the users' needs, PAs constantly collect personal data in order to personalize their services and adapt their behavior. In order to find out which objective Cognitive Load (CL) indicators reflect the users' perception of proactive system behavior in six specific use cases of an in-car PA, we conducted a Wizard of Oz study in a driving simulator with 42 participants. We varied traffic density and tracked physiological data, such as heart rate (HR) and electrodermal activity (EDA). We assessed the users' CL during the interaction with the PA by employing these data as well as real-time driving data (RTDA) via the Controller Area Network (CAN bus). The results show that physiological data like HR and EDA are not suitable to be used as indicators for the users' CL in this experiment. This is because the tracked physiological data do not show significant differences with respect to different traffic densities or proactivity. At the same time it has to be discussed whether the used type of recording physiological data is robust enough for our purposes. Concerning driving data, only the acceleration parameter showed a tendency towards differences between age groups, though insignificantly. The same is valid for the steering angle parameter when comparing male and female users. For future work, we plan to additionally evaluate subjective CL measures and other ratings to see whether these show more significant differences between the (non-)proactive assistants, traffic densities, or use cases.","PeriodicalId":240482,"journal":{"name":"Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1