Piotr Cofta

Piotr Cofta
Bydgoszcz University of Science and Technology

Professor

About

67
Publications
8,288
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
407
Citations

Publications

Publications (67)
Article
Full-text available
The main challenges when managing a fleet of unmanned aerial vehicles are to ensure the relative stability of its formation and to minimise disorganisation, specifically when undergoing an intrusion. When planning the mission it is beneficial for the operator to set the parameters of the formation to balance the needs of the mission with the disorg...
Article
Full-text available
The uncertainty introduced by the use of low-cost sensors in ad-hoc sensor networks is an ongoing concern that can be alleviated at the network level through a hybrid solution that relies on the use of reference nodes and reputation-based trust management. As reference nodes impose a significant expense, it is important to minimize their number whi...
Article
Full-text available
Static formations of swarms of rotorcraft drones, used for example in disaster management, are subject to intrusions, and must bear the cost of holding the formation while avoiding collisions which leads to their increased energy consumption. While the behaviour of the intruder is unpredictable, the formation can have its parameters set to try to b...
Article
Full-text available
The aim of the article is to build a rule-based model (RMFDN) for increasing the energy efficiency of Smart Cities' digital transformation processes. The problem that arises during the implementation of digital transformation processes concerns the measures that should be assigned to estimate the duration of the digital transformation. Previous stu...
Article
Full-text available
The growing popularity of inexpensive IoT (Internet of Things) sensor networks makes their uncertainty an important aspect of their adoption. The uncertainty determines their fitness for purpose, their perceived quality and the usefulness of information they provide. Nevertheless, neither the theory nor the industrial practice of uncertainty offer...
Article
Full-text available
Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studie...
Chapter
Low voltage electricity distribution network actively maintains the stability of its key parameters, primarily against the predictable regularity of seasonal changes. This makes long-term coarse prediction practical, but it hampers the accuracy of a short-term fine-grained one. Such predictability can further improve the stability of the network. T...
Article
Full-text available
Trust tends to be described through the lens of a rational choice of a trustor driven by the trustworthiness of a trustee. This, however, does not exhaust scenarios where people seem to be comfortable trusting without having an actual choice or not trusting while having a selection of potential trustees. This paper proposes that there should be ano...
Article
Full-text available
The proper power distribution systems operation is conditioned by its response to the consumers’ energy demand. This is achieved by using predictable power sources supplemented by ancillary services. With the penetration of different alternative power sources especially the renewable ones, the grid increasingly becomes an active distribution networ...
Article
Full-text available
The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical...
Article
Full-text available
Due to their growing number and increasing autonomy, drones and drone swarms are equipped with sophisticated algorithms that help them achieve mission objectives. Such algorithms vary in their quality such that their comparison requires a metric that would allow for their correct assessment. The novelty of this paper lies in analysing, defining and...
Chapter
The emergence of the IoT as an everyday fact raises the question how the IoT can be trusted. Considering that the IoT is pervasive to the level of being secretive, practically monopolistic and that human participation is often involuntary, it hardly satisfies the assumptions that associate the often researched types of trust relationships. In order...
Article
Code comprehension, a sub-domain of reverse engineering and software maintenance, does not provide useful explanation of common situations where developers, distributed and isolated from each other in time and space, come to a similar understanding of a code. This limits our ability to develop tools to support this popular aspect of code comprehens...
Book
This book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2019, held in Copenhagen, Denmark, in July 2019. The 7 revised full papers, 3 short papers, and 6 work-in-progress papers presented were carefully reviewed and selected from 32 submissions. The papers cover a broad range of...
Article
This paper discusses trust building within the European Reference Network for Critical Infrastructure Protection (ERNCIP) Project, in which a network of experts are building and promoting the first community focused specifically on European critical infrastructure protection research and practice. To this end, the paper examines the concept of trus...
Article
Trust, as a social construct, suffers from a lack of clarity, leading to the lack of a coherent, pragmatic model. The divisiveness of opinions on trust has led to a visible disruption in an important area of interdisciplinary research, resulting in trust being side-lined by control-based constructs of security and power. This negatively impacts on...
Article
Full-text available
It is trivial to say that the Web has changed the lives of the majority of us. There is no activity that has not been touched by the Web (directly or indirectly) and - in this process - somehow altered by it. The Web (and other large ICT mega-systems) permeates our lives regardless of our awareness of it and whether we like it or not. We increasing...
Book
The Web is shaping the way we communicate and live. It would therefore be beneficial to have a truly trustworthy Web. However, a systematic model of our relationship with the Web is missing, and this makes such a trustworthy Web an elusive target. The Foundations of a Trustworthy Web presents a thorough description of a model that enables the syste...
Article
Considering the recognised importance of a trustworthyWeb and trustworthy ICT infrastructure, it is surprising that there is not a single agreed approach to how to actually develop them, or what are the desired properties of it. We are not even certain whether an inanimate infrastructure can be considered trustworthy at all. If the truly trustworth...
Chapter
Companies are increasingly dependent on modern information and communication technology (ICT), yet the successful adoption of ICT systems stubbornly hovers at only around 50%, adding disappointment to business losses. Trust (both inter-personal and technology-related) has significant explanatory power when it comes to technology adoption, but only...
Article
Full-text available
It is widely recognised that successful online systems are not those that simply fulfil some functional specifications, but rather systems that are developed to also meet a number of non-functional requirements such as security, reliability and trust. It is also generally accepted that the development of quality online systems is not anymore just t...
Article
Companies are increasingly dependent on modern information and communication technology (ICT), yet the successful adoption of ICT systems stubbornly hovers at only around 50%, adding disappointment to business losses. Trust (both inter-personal and technology-related) has significant explanatory power when it comes to technology adoption, but only...
Article
This chapter is concerned with methodology. The authors utilise a case study of citizen identification systems (that are adopted or are in the process of consideration for adoption in several countries throughout the world) to illustrate the continuum of trust-related considerations and technology adoption, ranging from theoretical underpinnings of...
Book
Full-text available
The existence of large information and communication technology (ICT) structures, such as the Internet and the Web, and their impact on our everyday lives is an unquestionable fact of modern life. Trust and trustworthiness of such systems is often taken for granted, and accepted as a solution to all the ills of our society, duly replicated on the W...
Article
In this paper we propose that a comprehensive understanding of online trust will not only incorpo rate technical solutions that increase confidence regard ing the origin and veracity of information, but will also f acilitate an ongoing process of justified communication acros s networks. In order to accomplish these goals the b asic premises are th...
Article
Full-text available
Citizen identification systems (known also as ‘ID card systems’, or ‘national identity management systems’, even though those definitions are not identical) are receiving a mixed acceptance, with their privacy, security and usability being criticised, specifically in the UK. This paper investigates whether it is possible to improve social acceptanc...
Conference Paper
The particularly acute problem in privacy protection is to provide such a protection beyond the original disclosure of personal information. There, the need for privacy is strongly related to the confidence in the goodwill of the party that receives such information. In the absence of such a confidence, the disclosure should be limited. However, pu...
Conference Paper
Full-text available
Google is the most popular search engine and a highly valued Internet company. The question is therefore what may be social consequences of its long-term operation. This paper draws the vision of a 'Googleplex', the ultimate automatic Internet-driven holistic marketing machine for the post-modern market and analyses it from the perspective of trust...
Book
An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party’s trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society. Trust, Complexity and Control offe...
Article
An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party's trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society. Trust, Complexity and Control offe...
Chapter
IntroductionTrust ManagementResearch OverviewProblemsAutonomyChallenges to Trust ManagementThe Future of Trust ManagementThe Assessment of TrustEmbedded TrustworthinessTrusted Third PartyConclusion Bibliography
Chapter
IntroductionOverview of the ResearchQuality IndicatorsPropagation and Transitivity of ConfidenceTaxonomy of InteractionsAdditional ConsiderationsConclusion Bibliography
Chapter
IntroductionTaxonomy of ThreatsAttacksConclusion Bibliography
Chapter
IntroductionDevelopment of Confidence-Based RelationshipRelationship as a Signalling ProtocolSwift TrustEmergence of TrustBreach of TrustRestoration and ForgivenessDead EndsConclusion Bibliography
Chapter
IntroductioneBayeBay and the Model of ConfidencePotential Development of eBayConclusion Bibliography
Chapter
IntroductionConvergenceConvergence and ConfidenceConclusion Bibliography
Chapter
IntroductionThe Concept of TETTET PrinciplesTET RequirementsToolsExampleAnother ExampleConclusion Bibliography
Chapter
IntroductionReductive Approach: Security through ControlHolistic Approach: Security through TrustTrust and System DesignConclusion Bibliography
Chapter
IntroductionDriversTwo Types of ConfidenceStructuring the AreaDigital EquivalenceConclusion Bibliography
Chapter
IntroductionModelsComparative AnalysisConclusion Bibliography
Chapter
IntroductionFundamentalsTwo TrustsComplexity and ConfidenceThe ModelFormalisationEvidenceRecursionEnablersProcessingCharacteristics of Trust and ControlBibliography
Chapter
IntroductionTerminologyPrivacy and AuthenticationConfidence-based Privacy-preserving AuthenticationExampleThe Role of SIMContinuous AuthenticationIdentity and ConfidenceConclusion Bibliography
Chapter
IntroductionRelated WorksThe Starting PointThe Ethics of DistrustDistrust and the Model of ConfidenceThe Assessment of DistrustEvidence of DistrustThe Area BetweenTrust, Distrust, Mix-Trust and ComplexityDis-controlConclusion Bibliography
Chapter
IntroductionConfidence and EconomyEconomy of ConfidenceOpportunities in ConfidenceFences of the InternetTrust in a BottleConclusion Bibliography
Chapter
Basic ConceptsResearch OverviewTerminologyAgents Alice and BobConfidence as a StrategyNo ConfidencePragmatics of ConfidenceBibliography
Chapter
IntroductionRisk and UncertaintyEmpirical MetricsValue of ConfidenceCombining Risk and UncertaintyConclusion Bibliography
Article
Full-text available
Confidence (specifically trust) is one of the fundamental elements of relationships between people as well as between people and technology. It is, coincidentally, also one of the less understood ones. The identity of partners in a relationship has been taken for granted, but technology has created new challenges to such casual perception of identi...
Article
Full-text available
Trust is the key element of commerce, both for traditional models and — more recently — for eCommerce. Unlike its traditional counterpart, eCommerce relies on trust being created and maintained with the help of digital devices and services. Convergence brings significant changes to the way people interact through digital media by offering ubiquitou...
Conference Paper
Full-text available
Trust has been attracting a significant attention, both in its sociological and technical aspect. Distrust, the necessary counter-partner of trust, has not been a primary research target. This situation has led to significant shortage of research discussion about distrust. The paper discusses distrust from the perspective of the complexity-based mo...
Conference Paper
In a technology-intensive world humans are facing new problems stemming from the introduction of machine-intensive communication. The natural human ability to asses, accumulate and evaluate trust in other humans through direct interpersonal communications is significantly impaired when humans interact with systems alone. The development of applicat...
Conference Paper
Trust plays an important role in social life as well as in cyberspace. Trust establishment in cyberspace relies on human beings as well as digital components. Trusted computing platform (TCP) was proposed to improve the trust between users and their devices. However, current TCP lacks solutions for trust sustainability among TCPs, so that trust rel...
Conference Paper
Trust is playing an important role in communications and transactions. Based on different reasons of trust, different trusted domains, possibly disjoint, are formed in mobile communications, preventing complete systems from working properly. What is lacked therein is a bridge that can link domains, across trust gaps to establish a complete trusted...
Conference Paper
In an increasingly automated and networked world humans are facing new problems stemming from the introduction of machine-intensive communication. The natural human ability to asses, accumulate and evaluate trust in other humans through direct interpersonal communications is significantly impaired when humans interact with systems alone. The develo...
Chapter
Companies are increasingly dependent on modern information and communication technology (ICT), yet the successful adoption of ICT systems stubbornly hovers at only around 50%, adding disappointment to business losses. Trust (both inter-personal and technology-related) has significant explanatory power when it comes to technology adoption, but only...
Article
Trust has been studied from two different perspectives: so- cial/psychological and technical, leading to two disjoint yet similar concepts of trust. The paper concentrates on research in the promising areas of trust as a borderline phenomenon, between human and technology notions of trust. The paper proposes to structure such research area and iden...
Article
This research explores how one group of users perceives trustworthiness and reliability, as a form of professional judgment, when viewing text based information that is shared and distributed publically. In particular, this research explores how trust works in the domain of film exhibition and curating. A group of film professionals were studied to...

Network

Cited By