Attribute-Based Credentials for Trust 2014
DOI: 10.1007/978-3-319-14439-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…We, finally, remark that our study includes, in contrast to all other TAM studies except the one in Stamatiou et al [40] (to the best of our knowledge) several trust-related (i.e., trust towards the CILMS) factors (see Table 1). We believe that trust towards ICT system may lead to increased intention to participate as well as usage behaviour (i.e., frequency of use) as it was demonstrated in Stamatiou et al [40]. Trust, in the case of our target CILMS, is based on privacypreserving technologies which authenticate users (over some selected identity fields) retaining their anonymity.…”
Section: H14mentioning
confidence: 95%
See 1 more Smart Citation
“…We, finally, remark that our study includes, in contrast to all other TAM studies except the one in Stamatiou et al [40] (to the best of our knowledge) several trust-related (i.e., trust towards the CILMS) factors (see Table 1). We believe that trust towards ICT system may lead to increased intention to participate as well as usage behaviour (i.e., frequency of use) as it was demonstrated in Stamatiou et al [40]. Trust, in the case of our target CILMS, is based on privacypreserving technologies which authenticate users (over some selected identity fields) retaining their anonymity.…”
Section: H14mentioning
confidence: 95%
“…The proposed model is based on the model deployed in Stamatiou et al [40] for assessing the effectiveness of privacypreserving authentication technologies and, Privacy-ABCs in particular, in course evaluation systems in higher education.…”
Section: H14mentioning
confidence: 99%
“…Two prominent implementations of the Privacy-ABC concept are IBM's Identity Mixer [10,11] and Microsoft's U-Prove [12]. The use of Privacy ABCs has been used as the main pilot in the ABC4Trust Project [13][14][15], and particularly for implementing anonymous evaluation in the academic environment [16][17][18]. For example, in the pilot study of [18], 45 students of the University of Patras used Privacy-ABC technology for remotely participating in privacy-preserving course evaluation.…”
Section: Related Work On Anonymous Evaluation Systemsmentioning
confidence: 99%
“…The use of Privacy ABCs has been used as the main pilot in the ABC4Trust Project [13][14][15], and particularly for implementing anonymous evaluation in the academic environment [16][17][18]. For example, in the pilot study of [18], 45 students of the University of Patras used Privacy-ABC technology for remotely participating in privacy-preserving course evaluation. In the online educational evaluation system of [17], Attribute Based Credentials [15] were employed to allow students to evaluate, anonymously, the competence of the subjects they have selected.…”
Section: Related Work On Anonymous Evaluation Systemsmentioning
confidence: 99%
“…Furthermore, ABC systems have been analyzed in the context of various application scenarios, including car rental [7], vehicular ad-hoc networks (VANETs) [17], ticketing systems [22], eHealth [26], or course evaluation in high schools [24,31].…”
Section: Introductionmentioning
confidence: 99%