994 resultados para Trust Networks


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Internet’s unbounded opportunity for inter-firm exchanges is limited by concerns about trust, however, little is known about the development and formation of trust in the area of electronic business-to-business relationships. Drawing on existing research the aim of paper is to explore differences arising between trust in the traditional and in the electronic business to business relationship. In addition, an overall research framework is developed which links trust formation to three dimensions: the type of interaction, the stage of the relationship lifecycle and the type of transacting organizations. These dimensions are further examined in different relationship scenarios. Finally, implications for the agri-food industry are examined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2014

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work looks into video quality assessment applied to the field of telecare and proposes an alternative metric to the more traditionally used PSNR based on the requirements of such an application. We show that the Pause Intensity metric introduced in [1] is also relevant and applicable to heterogeneous networks with a wireless last hop connected to a wired TCP backbone. We demonstrate through our emulation testbed that the impairments experienced in such a network architecture are dominated by continuity based impairments rather than artifacts, such as motion drift or blockiness. We also look into the implication of using Pause Intensity as a metric in terms of the overall video latency, which is potentially problematic should the video be sent and acted upon in real-time. We conclude that Pause Intensity may be used alongside the video characteristics which have been suggested as a measure of the overall video quality. © 2012 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper discusses the difficulties involved in managing knowledge-intensive, multinational, multiorganisational, and multifunctional project networks. The study is based on a 2-year quasi-ethnography of one such network engaged in the design and development of a complex new process control system for an existing pharmaceutical plant in Ireland. The case describes how, drawing upon the organisational heritage of the corporations involved and the logic implicit within their global partnership arrangements, the project was initially structured in an aspatial manner that underestimated the complexity of the development process and the social relations required to support it. Following dissatisfaction with initial progress, a number of critical management interventions were made, which appeared to contribute to a recasting of the network ontology that facilitated the cultivation and protection of more appropriate communicative spaces. The case emphasises the need to move away from rationalistic assumptions about communication processes within projects of this nature, towards a richer conceptualisation of such enterprises as involving collective sensemaking activities within and between situated ‘communities’ of actors. Contrary to much contemporary writing, the paper argues that space and location are of crucial importance to our understanding of network forms of organising.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As an important component in collaborative natural resource management and nonprofit governance, social capital is expected to be related to variations in the performance of land trusts. Land trusts are charitable organizations that work to conserve private land locally, regionally, or nationally. The purpose of this paper is to identify the level of structural and cognitive social capital among local land trusts, and how these two types of social capital relate to the perceived success of land trusts. The analysis integrates data for land trusts operating in the U.S. south-central Appalachian region, which includes western North Carolina, southwest Virginia, and east Tennessee. We use factor analysis to elicit different dimensions of cognitive social capital, including cooperation among board members, shared values, common norms, and communication effectiveness. Measures of structural social capital include the size and diversity of organizational networks of both land trusts and their board members. Finally, a hierarchical linear regression model is employed to estimate how cognitive and structural social capital measures, along with other organizational and individual-level attributes, relate to perceptions of land trust success, defined here as achievement of the land trusts’ mission, conservation, and financial goals. Results show that the diversity of organizational partnerships, cooperation, and shared values among land trust board members are associated with higher levels of perceived success. Organizational capacity, land trust accreditation, volunteerism, and financial support are also important factors influencing perceptions of success among local, nonprofit land trusts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

During the last two decades there have been but a handful of recorded cases of electoral fraud in Latin America. However, survey research consistently shows that often citizens do not trust the integrity of the electoral process. This dissertation addresses the puzzle by explaining the mismatch between how elections are conducted and how the process is perceived. My theoretical contribution provides a double-folded argument. First, voters’ trust in their community members (“the local experience”) impacts their level of confidence in the electoral process. Since voters often find their peers working at polling stations, negative opinions about them translate into negative opinions about the election. Second, perceptions of unfairness of the system (“the global effect”) negatively impact the way people perceive the transparency of the electoral process. When the political system fails to account for social injustice, citizens lose faith in the mechanism designed to elect representatives -and ultimately a set of policies. The fact that certain groups are systematically disregarded by the system triggers the notion that the electoral process is flawed. This is motivated by either egotropic or sociotropic considerations. To test these hypotheses, I employ a survey conducted in Costa Rica, El Salvador, Honduras, and Guatemala during May/June 2014, which includes a population-based experiment. I show that Voters who trust their peers consistently have higher confidence in the electoral process. Whereas respondents who were primed about social unfairness (treatment) expressed less confidence in the quality of the election. Finally, I find that the local experience is predominant over the global effect. The treatment has a statistically significant effect only for respondents who trust their community. Attribution of responsibility for voters who are skeptics of their peers is clear and simple, leaving no room for a more diffuse mechanism, the unfairness of the political system. Finally, now I extend analysis to the Latin America region. Using data from LAPOP that comprises four waves of surveys in 22 countries, I confirm the influence of the “local experience” and the “global effect” as determinants of the level of confidence in the electoral process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Part 10: Sustainability and Trust

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explores how trust is manifested and impacts on the levels of collaboration that take place in sport governance networks. A case study approach was used as the guiding method to examine the contributingfactors that facilitate or inhibit trusting relationships between boards within sporting networks. Three sports from Australia were employed as the population for the study and 36 in-depth interviews were conductedwith participants from national and state organizations operating within those networks, two federated and one partially unified. Interviews were analyzed using an interpretive process, and a thematic structure relatingto the issues and impact of trust and distrust within the three networks was developed. Extant levels of trust, transparency, the capacity to build trust, and leadership emerged as the key themes in the study. Thedegree to which each of these dimensions was embedded in the cultures and processes of each network varied significantly. Leadership specifically, as a key finding, was shown to be an important factor in fostering collaborative relations at the governance level of these systems. A number of implications for sport governance practice and possible extensions for sport governance research based on these findings conclude the article.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing complexity of computer systems and communication networks induces tremendous requirements for trust and security. This special issue includes topics on trusted computing, risk and reputation management, network security and survivable computer systems/networks. These issues have evolved into an active and important area of research and development. The past decade has witnessed a proliferation of concurrency and computation systems for practice of highly trust, security and privacy, which has become a key subject in determining future research and development activities in many academic and industrial branches. This special issue aims to present and discuss advances of current research and development in all aspects of trusted computing and network security. In addition, this special issue provides snapshots of contemporary academia work in the field of network trusted computing. We prepared and organized this special issue to record state-of-the-art research, novel development and trends for future insight in this domain. In this special issue, 14 papers have been accepted for publication, which demonstrate novel and original work in this field. A detailed overview of the selected works is given below.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The rapid development and increasing complexity of computer systems and communication networks coupled with the proliferation of services and applications in both Internet-based and ad-hoc based environments have brought network and system security issues to the fore. We have been witnessing ever-increasing cyber attacks on the network and system leading to tarnished confidence and trusts in the use of networked distributed systems. As a result, there is an increasing demand for development of new trust, security and privacy approaches to guarantee the privacy, integrity, and availability of resources in networked distributed systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the early modern period, trade became a truly global phenomenon. The logistics, financial and organizational complexity associated with it increased in order to connect distant geographies and merchants from different backgrounds. How did these merchants prevent their partners from dishonesty in a time where formal institutions and legislation did not traverse these different worlds? This book studies the mechanisms and criteria of cooperation in early modern trading networks. It uses an interdisciplinary approach, through the case study of a Castilian long-distance merchant of the sixteenth century, Simon Ruiz, who traded within the limits of the Portuguese and Spanish overseas empires. Early Modern Trading Networks in Europe discusses the importance of reciprocity mechanisms, trust and reputation in the context of early modern business relations, using network analysis methodology, combining quantitative data with qualitative information. It considers how cooperation and prevention could simultaneously create a business relationship, and describes the mechanisms of control, policing and punishment used to avoid opportunism and deception among a group of business partners. Using bills of exchange and correspondence from Simon Ruiz’s private archive, it charts the evolution of this business network through time, debating which criteria should be included or excluded from business networks, as well as the emergence of standards. This book intends to put forward a new approach to early modern trade which focuses on individuals interacting in self-organized structures, rather than on states or empires. It shows how indirect reciprocity was much more frequent than direct reciprocity among early modern merchants and how informal norms, like ostracism or signaling, helped to prevent defection and deception in an effective way.

Relevância:

20.00% 20.00%

Publicador: