The relationship between trust in AI and trustworthy machine learning technologies
(2020)
Presentation / Conference Contribution
Toreini, E., Aitken, M., Coopamootoo, K., Elliott, K., Zelaya, C. G., & van Moorsel, A. (2020, December). The relationship between trust in AI and trustworthy machine learning technologies. Presented at Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency
All Outputs (5)
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking (2020)
Presentation / Conference Contribution
Aitken, M., Ng, M., Toreini, E., van Moorsel, A., Coopamootoo, K. P., & Elliott, K. (2020, December). Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. Presented at European Symposium on Research in Computer Security 2020, Guildford, EnglandWhile there is substantial interest in ethical practice relating to Artificial Intelligence (AI), to date there has been limited consideration of what this means in the banking sector. This study aimed to address this gap in the literature through a... Read More about Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking.
What Is This Sensor and Does This App Need Access to It? (2019)
Presentation / Conference Contribution
Mehrnezhad, M., & Toreini, E. (2019, December). What Is This Sensor and Does This App Need Access to It?. Presented at Informatics
Making sense of sensors: mobile sensor security awareness and education (2018)
Presentation / Conference Contribution
Mehrnezhad, M., Toreini, E., & Alajrami, S. (2018, December). Making sense of sensors: mobile sensor security awareness and education. Presented at Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript (2015)
Presentation / Conference Contribution
Mehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2015, December). Touchsignatures: Identification of user touch actions based on mobile sensors via javascript. Presented at Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security