[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust

  • Chapter
  • First Online:
Attribute-based Credentials for Trust

Abstract

In this chapter we describe one of the pilots of the ABC4Trust project that we developed in order to offer privacy-preserving course evaluations at universities. The distinctive feature of this application is that the pilot system can authenticate students, with respect to their eligibility to evaluate a course, without requiring from them any identifying information. Thus, it is impossible for the system to link participants with their evaluations and, therefore, participants’ privacy is protected while the system is certain to receive evaluations only from eligible participants. In this chapter we describe the pilot context, the high level architecture of the pilot system as well as a questionnaire-based evaluation process for user acceptance. Along with a usability evaluation of the pilot prototype, we considered possible user acceptance factors for Privacy-ABCs and developed a novel model of user acceptance in a privacy critical setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Joerg Abendroth, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou, and Harald Zwingelberg. D7.1 application description for students, 2012. https://abc4trust.eu/download/ABC4Trust-D7.1-Application-Description-Students.pdf.

    Google Scholar 

  2. Anick Bosmans and Hans Baumgartner. Goal-relevant emotional information: When extraneous affect leads to persuasion and when it does not. Journal of Consumer Research, 32(3):424–434, 2005.

    Google Scholar 

  3. Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, and Yannis Stamatiou. User acceptance of privacy-abcs: An exploratory study. In HCI International: Human Aspects of Information Security, Privacy and Trust, 2014. (to appear).

    Google Scholar 

  4. Souheil Bcheri, Norbert Götze, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Yannis Stamatiou, Katalin Storf, Peder Wängmark, and Harald Zwingelberg. D5.1 scenario definition for both pilots, 2012. https://abc4trust.eu/download/ABC4Trust-D5.1-Scenario-Definition.pdf.

    Google Scholar 

  5. John Brooke. SUS - A quick and dirty usability scale. Usability evaluation in industry, 189:194, 1996.

    Google Scholar 

  6. Lorrie Faith Cranor and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, 2005.

    Google Scholar 

  7. Jacob Cohen. Statistical power analysis for the behavioral sciences. Lawrence Erlbaum Associates, Inc, 1988.

    Google Scholar 

  8. Fred D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, pages 319–340, 1989.

    Google Scholar 

  9. Fred D. Davis. User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3):475–487, 1993.

    Google Scholar 

  10. Daniel Deibler, Malte Engeler, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Eva Schlehahn, Yannis Stamatiou, Welderufaelr Tesfay, and Harald Zwingelberg. D7.3 evaluation of the student pilot, 2014. https://abc4trust.eu/index.php/pub/deliverables.

    Google Scholar 

  11. Kasper Damgaard, Hamza Ghani, Norbert Götze, Anja Lehmann, Vasiliki Liagkou, Jesus Luna, Gert Læssøe Mikkelsen, Apostolos Pyrgelis, and Yannis Stamatiou. D7.2 necessary hardware and software package for the student pilot deployment, 2012. https://abc4trust.eu/download/ABC4Trust-D7.2.Hard-and-Software-Package-for-Student-Pilot.pdf.

    Google Scholar 

  12. Tamara Dinev and Paul Hart. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2):7–29, 2006.

    Google Scholar 

  13. Andy Field. Discovering statistics using IBM SPSS statistics. Sage, 2013.

    Google Scholar 

  14. Chin-Lung Hsu and Hsi-Peng Lu. Why do people play on-line games? An extended tam with social influences and flow experience. Information & Management, 41(7):853–868, 2004.

    Google Scholar 

  15. ISO/IEC. 9241-11 Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability. 1998:ISO/IEC 9241-11: 1998 (E).

    Google Scholar 

  16. James R. Lewis. IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction, 7(1):57–78, 1995.

    Google Scholar 

  17. Rensis Likert. A technique for the measurement of attitudes. Archives of psychology, 1932.

    Google Scholar 

  18. James R. Lewis, Brian S. Utesch, and Deborah E. Maher. UMUXLITE: when there’s no time for the SUS. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2099–2102. ACM, 2013.

    Google Scholar 

  19. D. Harrison McKnight, Michelle Carter, Jason Bennett Thatcher, and Paul F. Clay. Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2):12, 2011.

    Google Scholar 

  20. Paul A. Pavlou. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International journal of electronic commerce, 7(3):101–134, 2003.

    Google Scholar 

  21. Georg Regal, Marc Busch, Stephanie Deutsch, Christina Hochleitner, Martin Lugmayr, and Manfred Tscheligi. Money on the move workload, usability and technology acceptance of second-screen atminteractions. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 281–284. ACM, 2013.

    Google Scholar 

  22. Sarah Spiekermann and Lorrie Faith Cranor. Engineering privacy. Software Engineering, IEEE Transactions on, 35(1), 2009.

    Google Scholar 

  23. Sarah Spiekermann. Privacy enhancing technologies for RFID in retail – an empirical investigation. In UbiComp 2007: Ubiquitous Computing, pages 56–72. Springer, 2007.

    Google Scholar 

  24. Sarah Spiekermann. User control in ubiquitous computing: design alternatives and user acceptance. Shaker, 2008.

    Google Scholar 

  25. San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 4. ACM, 2011.

    Google Scholar 

  26. Viswanath Venkatesh and Hillol Bala. Technology acceptance model 3 and a research agenda on interventions. Decision sciences, 39(2):273–315, 2008.

    Google Scholar 

  27. Viswanath Venkatesh and Fred D. Davis. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management science, 46(2):186–204, 2000.

    Google Scholar 

  28. Erik Wästlund, Julio Angulo, and Simone Fischer-Hübner. Evoking comprehensive mental models of anonymous credentials. In Open Problems in Network Security, pages 1–14. Springer, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yannis Stamatiou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Stamatiou, Y. et al. (2015). Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_7

Download citation

Publish with us

Policies and ethics