Artem Katasonov, Jari Veijalainen and Markku Sakkinen
In this paper, we develop and evaluate an approach to assessing the content quality in a location‐based service (LBS). The proposed approach, instead of assessing the quality in…
Abstract
In this paper, we develop and evaluate an approach to assessing the content quality in a location‐based service (LBS). The proposed approach, instead of assessing the quality in absolute terms such as completeness or accuracy, measures the effect that the imperfection of the content is having on the reliability of that specific LBS. We apply the basic ideas from Software Reliability Engineering (SRE), but develop a modification of SRE, 2‐Branch, in order to separate content quality from other factors, such as positioning imprecision, and to reduce the measurement error. In our experimental study, we first compare 2‐Branch to the standard SRE, after which we experimentally analyze some properties of SRE methodology as such in the context of an LBS. The experiments indicate that 2‐Branch has in most cases a lower measurement error than the standard SRE. A corollary to that is that 2‐Branch can achieve, therefore, as low an error level as the standard SRE, using a worse and thus cheaper oracle. Getting a good oracle is probably the main cost factor in evaluating the quality of an information service, thus being able to use a cheaper one may result in significant savings.
Details
Keywords
Oleksiy Mazhelis, Jouni Markkula and Jari Veijalainen
To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and…
Abstract
Purpose
To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.
Design/methodology/approach
The reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.
Findings
In order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combined. The use of the dynamic part enables continuous and user‐friendly verification, while the static part is responsible for accurate verification. A suitable distribution of architecture components between the terminal and the remote server is proposed.
Research limitations/implications
The proposed architecture represents a specification that corresponds to the computational viewpoint of the reference model for open distributed processing. Other specifications, such as engineering or technological specifications, which are needed for successful implementation of the system, are not provided in the paper.
Practical implications
The paper provides a specification of the integrated identify verification system architecture that can be utilised during further design and subsequent implementation of the system.
Originality/value
While available approaches to identity verification in a mobile environment concentrate mainly on connectivity identity verification (employed in accessing communication services), the proposed architecture focuses on application‐level identity verification needed to access application‐level resources, remotely or locally on the terminal.