Acta Informatica Pragensia, 2024 (vol. 13), issue 3

Article

Securing RPL-Based Networks Against Version Number and Rank Attacks

Alaa Eddine Khalfoune, Rachid Beghdad

Acta Informatica Pragensia 2024, 13(3), 340-358 | DOI: 10.18267/j.aip.2343448  

The increasing reliance on Low-power and Lossy Networks (LLN) in the Internet of Things (IoT) and their vulnerability to various attacks have made their protection necessary. Most of the proposed approaches to protecting such networks neither support scalability nor are lightweight enough to be incorporated into these constrained networks. In this paper, we present a lightweight approach to protecting LLN networks from rank and version number attacks. The proposal relies on light exchanged messages between the network nodes and the root and network nodes themselves. Successive comparison processes are used to detect the attack while two blocking techniques...

The Fairness Stitch: A Novel Approach for Neural Network Debiasing

Modar Sulaiman, Kallol Roy

Acta Informatica Pragensia 2024, 13(3), 359-373 | DOI: 10.18267/j.aip.2412797  

The pursuit of fairness in machine learning models has become increasingly crucial across various applications, including bank loan approval and face detection. Despite the widespread use of artificial intelligence algorithms, concerns persist regarding biases and discrimination within these models. This study introduces a novel approach, termed “The Fairness Stitch” (TFS), aimed at enhancing fairness in deep learning models by combining model stitching and training jointly, while incorporating fairness constraints. We evaluate the effectiveness of TFS through a comprehensive assessment using two established datasets, CelebA and UTKFace....

Blockchain-Powered Patient-Centric Access Control with MIDC AES-256 Encryption for Enhanced Healthcare Data Security

Krishna Prasad Narasimha Rao, Selvan Chinnaiyan

Acta Informatica Pragensia 2024, 13(3), 374-394 | DOI: 10.18267/j.aip.2423908  

Patient-centric access control in healthcare data management is paramount for ensuring privacy, confidentiality and security. In this paper, we propose a novel blockchain-powered patient-centric access control system integrated with MIDC AES-256 encryption to enhance healthcare data security. The proposed system prioritizes patient autonomy by granting patients control over access to their detailed health information, while hospitals are authorized to share relevant medical history. Using blockchain technology ensures decentralization, transparency and immutability of data, while smart contracts and consensus mechanisms enforce accountability and integrity....

Evaluation of the I-Voting System for Remote Primary Elections of the Czech Pirate Party

Tomáš Martínek, Michal Malý

Acta Informatica Pragensia 2024, 13(3), 395-417 | DOI: 10.18267/j.aip.2493887  

The integration of digital technologies into political processes represents a pivotal shift in the operational dynamics of political parties, highlighting an evolution from traditional to digital platforms. This transformation offers greater member engagement and decision-making transparency while also introducing new challenges in terms of security and control. This study presents an analytical overview of the Helios voting system as implemented by the Czech Pirate Party, used not only for primary elections, offering a critical examination of its operational framework, security measures, verification processes, and implications for intra-party democracy...

Investigating the Causes of Non-realization of Project Prediction and Proposal of a New Prediction Framework

Radek Doskočil, Branislav Lacko

Acta Informatica Pragensia 2024, 13(3), 418-432 | DOI: 10.18267/j.aip.2502979  

The main goal of the paper is to identify the causes of non-realization of project prediction and to propose a new framework for project prediction. A secondary goal is to explain why the approaches to project prediction used currently do not provide satisfactory results. The research was realised in the form of qualitative research using semi-structured interviews. The findings reveal that the main causes of non-realization of project prediction are follows: there is no methodology that could be practically used; simplified approaches to project prediction usually have low reliability for which reason they are generally unusable; suitable input data...

Review

Information Ethics in Light of Bibliometric Analyses: Discovering a Shift to Ethics of Artificial Intelligence

Jela Steinerová, Miriam Ondrišová

Acta Informatica Pragensia 2024, 13(3), 433-459 | DOI: 10.18267/j.aip.2373598  

The objectives of this study are to analyse the content of publications focused on the area of information ethics and discover patterns, knowledge and thematic trends. The main research question is: What is the intellectual and topical structure of the field of information ethics? We apply bibliometric analytical methods, including co-citation analysis (41 most cited authors out of 9947), co-word analysis (127 keywords), visualizations (maps) and analysis of time periods in strategic diagrams. These methods are interpreted with the use of previous content analyses and results of a Delphi study. The dataset covers publications between 1988 and 2023...

Miscellanea

Generative Artificial Intelligence in Education: Advancing Adaptive and Personalized Learning

Manel Guettala, Samir Bourekkache, Okba Kazar, Saad Harous

Acta Informatica Pragensia 2024, 13(3), 460-489 | DOI: 10.18267/j.aip.23511633  

The integration of generative artificial intelligence (AI) into adaptive and personalized learning represents a transformative shift in the educational landscape. This research paper investigates the impact of incorporating generative AI into adaptive and personalized learning environments, with a focus on tracing the evolution from conventional artificial intelligence methods to generative AI and identifying its diverse applications in education. The study begins with a comprehensive review of the evolution of generative AI models and frameworks. A framework of selection criteria is established to curate case studies showcasing the applications of...