To see the other types of publications on this topic, follow the link: Trust by the way of security.

Journal articles on the topic 'Trust by the way of security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trust by the way of security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.

Full text
Abstract:
IoT security is a combination of physical device security and network security. The objective of the IoT security module is to hide the network from communication vulnerabilities between the transmitter module and the server. Also, the security algorithms are designed to protect the systems from software attacks and physical hardware attacks. The paper explores the ongoing advancements and research in the field of IoT security by analyzing the research limitations and issues of the existing models. The research gaps identified from the literature analysis explores the way where the research on
APA, Harvard, Vancouver, ISO, and other styles
3

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.

Full text
Abstract:
Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model w
APA, Harvard, Vancouver, ISO, and other styles
4

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Full text
Abstract:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requir
APA, Harvard, Vancouver, ISO, and other styles
5

Zhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.

Full text
Abstract:
The article analyzes the influence of the social network on humanity. For many years, humanity has realized even in social networks the need for psychological security. Social media confrontation is psychological warfare on a virtual level. Expecting negative information on a social network, people communicate only with friends, like-minded people. Communication on the social network has intensified over the past three years, due to the pandemic in the world, minimal contact has entered the way of life of mankind. Nevertheless, any positive and negative information can affect the psychological
APA, Harvard, Vancouver, ISO, and other styles
6

Najib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.

Full text
Abstract:
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context informat
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.

Full text
Abstract:
The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First,
APA, Harvard, Vancouver, ISO, and other styles
8

Orkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.

Full text
Abstract:
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, suppliers, partners, and governments, collecting and selectively sharing huge amounts of data. The value of stored and in-transit information is rising rapidly, driving new markets and generating a need for securely connecting devices and delivering trusted data. Data integrity is a vital component in economy which can pertain to individuals, companies, governments and globally. It is a measure of the validity and reliability of a data. While internal audit has taken some steps toward keeping up w
APA, Harvard, Vancouver, ISO, and other styles
9

Venkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.

Full text
Abstract:
Zero Trust Software-Defined Wide Area Network (SD-WAN) technology has emerged as a critical solution for the healthcare industry undergoing digital transformation. This architecture adopts a "never trust, always verify" article that fundamentally differs from traditional perimeter-based security models, making it particularly valuable in healthcare environments where diverse stakeholders require varying access to sensitive data. The implementation of Zero Trust SD-WAN delivers multiple benefits for healthcare organizations, including enhanced security through identity verification, continuous
APA, Harvard, Vancouver, ISO, and other styles
10

Surendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.

Full text
Abstract:
The current research paper assesses the financial and operational impacts of enforcing zero-trust security models in financial planning systems. As the risk of cyberattacks intensifies and the regulations become unexpectedly complicated, these groups are in a desperate search for a comprehensive security system. As such, the zero trust security model, which focuses on real-time security monitoring, the enforcement of continuous identity validation, and the concept of least privilege, is gradually becoming considered as a relevant strategy for addressing such risks. In assessing organisational
APA, Harvard, Vancouver, ISO, and other styles
11

Cao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.

Full text
Abstract:
Trust problem is a key issue for Mobile P2P (MP2P) network security. In MP2P network, terminals addressing mode, communication way and display identifier are different to traditional P2P network. Some security issues such as: malicious slander and collusion, free ride phenomenon, are even more serious compared to traditional P2P network. Aimed at these above issues, a Proxy-based Security-Feedback Trust Model (PSTM) is proposed. Different types of terminals access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P equipment access network layer.
APA, Harvard, Vancouver, ISO, and other styles
12

Kumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.

Full text
Abstract:
Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper giv
APA, Harvard, Vancouver, ISO, and other styles
13

Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.

Full text
Abstract:
Hardware security in the cyber security domain had become a more of a controversial topic over the past decade due to the introduction of new design technologies in semiconductors and expansion of global supplier chains. In proportion to the technological advancement of hardware production, the success rate of the existing hardware attacks had also evolved over the time with a significantly high rate of emergence of new attacking techniques and methods. Computing hardware is becoming a more and more attractive attack surface due to several reasons. The technology of analyzing the hardware comp
APA, Harvard, Vancouver, ISO, and other styles
14

Basco-Galangco, R. B., and D. L. Chinayo. "The State of Police Legitimacy Through the People's Trust and Satisfaction in the Performance of the Police of Their Duties." American Journal of Multidisciplinary Research and Innovation 1, no. 6 (2022): 47–55. https://doi.org/10.54536/ajmri.v1i6.872.

Full text
Abstract:
People are likely to cooperate with the police when they view their authority as legitimate. Police legitimacy is established by the people’s trust in them and the people’s satisfaction in the way they perform their duties. This study surveyed and correlated the community people’s trust and satisfaction in the police’s performance of their duties. There were 2,381 respondents from the different provinces of the Cordillera Administrative Region, Philippines, who participated in the survey. The respondents moderately trust the police and were much satisfied with the way t
APA, Harvard, Vancouver, ISO, and other styles
15

Ragul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.

Full text
Abstract:
Objectives: The research presents Dynamic Trust Evaluation (DTEF) as a blockchain-powered framework for IoT security which implements real-time assessment of trust while adapting policies and detecting anomalies. The system intends to overcome scalability and privacy problems that result from operating large-scale IoT networks. Methods: Secure trust evaluations and blockchain network policy enforcement is made possible through the integration of Attribute-Based Access Control (ABAC) and Elliptic Curve Digital Signature Algorithm (ECDSA) within DTEF. Performance evaluation was conducted by test
APA, Harvard, Vancouver, ISO, and other styles
16

Revanth P S B.E. "Blockchain-Secured and VPN Integrated Power Systems Management." Dandao Xuebao/Journal of Ballistics 37, no. 1 (2025): 25–34. https://doi.org/10.52783/dxjb.v37.166.

Full text
Abstract:
Integration VPN and blockchain technology for power system management provides a transformative approach to the user by addressing obstacles of data security transparency and efficiency with the help of decentralized energy grids. As a modern power system, it enhances its dependency on distributed renewable energy sources and integrated smart grids which require robust protection of data and operation integrity. Blockchain provides a decentralized immutable laser for securely recording energy transaction monitoring performance and protecting from unauthorized access. This ensures transparency
APA, Harvard, Vancouver, ISO, and other styles
17

Sreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.

Full text
Abstract:
Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data secur
APA, Harvard, Vancouver, ISO, and other styles
18

El-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.

Full text
Abstract:
In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address t
APA, Harvard, Vancouver, ISO, and other styles
19

Pavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.

Full text
Abstract:
Security modelling and analysing not only require solving technical problems but also reasoning on the organization as a whole for the development of a secure system. Assumptions exist about trust relationships among actors within the system environment, which play an important role in modelling and analysing security. Such assumptions are critical and must be analysed systematically for ensuring the overall system security. In this paper, the authors introduce trust-based concepts to identify these trust assumptions, and integrate the trust concepts with security concepts for the development
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.

Full text
Abstract:
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS at
APA, Harvard, Vancouver, ISO, and other styles
21

Yan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (2018): 2495. http://dx.doi.org/10.3390/su10072495.

Full text
Abstract:
With the new round of global nuclear issues, the populace’s emotion has been tensed and discomposure has been trigged off. To accurately understand the sense of nuclear safety & security for the Chinese public and ensure that the government makes reasonable decisions regarding nuclear issues, a special questionnaire and evaluation has been carried out. With the use of the principles for sociology of security, the methods of questionnaires and SPSS, a three-dimension assessment system, which consists of knowledge and experience, internal, and external trust, and the way of perception, was c
APA, Harvard, Vancouver, ISO, and other styles
22

Zhi, Kuiyun, Qiurong Tan, Si Chen, et al. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.

Full text
Abstract:
Several studies have found that trust in government is associated with social fairness, citizens’ satisfaction with public service, and life satisfaction. This study aimed to investigate the serial mediation effects of social security satisfaction and life satisfaction on the association between social security fairness and trust in government. We analyzed the data from the Chinese Social Survey in 2019 (n = 7403) to examine the serial mediation effects. The findings showed that the higher the level of government, the greater the trust it enjoyed from its citizens. The direct prediction of tru
APA, Harvard, Vancouver, ISO, and other styles
23

Dr., Namita Mittal. "User Perceptions of Privacy and Security in Online Social Networks." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 91–94. https://doi.org/10.5281/zenodo.7547576.

Full text
Abstract:
User perceptions of privacy and security on online social networks is a complex issue that encompasses various factors such as awareness of privacy settings, trust in the platform, use of third-party apps and services, attitudes towards data collection and usage, response to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools. This can greatly influence the way they interact with the platform. Users' reaction to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools can also greatly impact their trust and behavior on the platfo
APA, Harvard, Vancouver, ISO, and other styles
24

Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.

Full text
Abstract:
bstract: Cloud computing environment is a new way in which web base enable applications provide as a service for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users byproviding virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it
APA, Harvard, Vancouver, ISO, and other styles
25

Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Full text
Abstract:
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security thr
APA, Harvard, Vancouver, ISO, and other styles
26

Almarri, Seetah, and Ahmed Aljughaiman. "Blockchain Technology for IoT Security and Trust: A Comprehensive SLR." Sustainability 16, no. 23 (2024): 10177. http://dx.doi.org/10.3390/su162310177.

Full text
Abstract:
After the emergence of the Internet of Things (IoT), the way devices interact with each other changed, as it allowed automation and seamless communication in various fields. However, various challenges related to security and trust have emerged, hindering the widespread adoption of the IoT. Blockchain technology is considered the ideal solution to face these challenges because of its immutable and decentralized nature. This paper explores the potential of blockchain technology to address critical security and trust challenges within the rapidly growing IoT ecosystem. Through a systematic liter
APA, Harvard, Vancouver, ISO, and other styles
27

Manalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.

Full text
Abstract:
This study aims to explain a comprehensive model that explains the impact of perceived security and perceived ease of use in influencing intention to use and how they contribute through trust in the context of using digital payment applications in Jakarta. The purpose of this study is to analyze the effect of perceived security on trust, the effect of perceived ease of use on trust, the effect of perceived security on intention to use, the effect of perceived ease of use on intention to use, the effect of trust on intention to use, the effect of perceived security on intention to use through t
APA, Harvard, Vancouver, ISO, and other styles
28

Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.

Full text
Abstract:
This paper examines the users’ perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the technological and industrial approaches to security. The user-centered research on banking was conducted at the Royal Melbourne University of Technology University and Griffith University, both of which are part of the Smart Internet Technology Cooperative Research Centre. We conclude that the most effective way to increase the perception of Internet banking security is to increase ease of use, convenience, personalisation and
APA, Harvard, Vancouver, ISO, and other styles
29

Curtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.

Full text
Abstract:
Purpose The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach. Design/methodology/approach The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company. Findings This study found that the presence or absence of a pr
APA, Harvard, Vancouver, ISO, and other styles
30

Usman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.

Full text
Abstract:
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores. Homophily i.e., love of the same, is the tendency of individuals to associate and bond with similar others mentioned in the social network, and the authors have discovered its presence, in term of nodes' attributes, in studying trust and reputation behaviors for the P2P oriented next generation of WSN. The simulation studies have confirmed the structural homop
APA, Harvard, Vancouver, ISO, and other styles
31

Negi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.

Full text
Abstract:
Management of trust is one of the most challenging parts in cloud computing. Cloud service’s features such as distributed, dynamic and nontransparentintroduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud serviceprovider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure ofany intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;hence, in case if a
APA, Harvard, Vancouver, ISO, and other styles
32

Lalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.

Full text
Abstract:
MANETs are substantially more defenseless to different attacks due to receptiveness in network topology and being endless of a preferred performance in the network. As a result of that, more malicious nodes are regularly intruding without being recognized from the network topology. MANET needs exceptionally particular security techniques to detach the false passage. Also, no single solution is fit into various sorts of the network. The networks perform admirably if the nodes are trusty and act appropriately helpfully. The goal is to enhance the security of the network. This paper begins the ne
APA, Harvard, Vancouver, ISO, and other styles
33

Ola, Adegboyega Adedolapo. "Electoral Violence and Arms Proliferation in Nigeria: Causes, Consequences and Way Forward." African Journal of Stability and Development (AJSD) 11, no. 2 (2018): 446–59. http://dx.doi.org/10.53982/ajsd.2018.1102.13-j.

Full text
Abstract:
One of the greatest challenges facing governance and political systems in Africa is the violence that ensues whenever elections are conducted. The main objective of the study was to examine the relationship between electoral violence and arms proliferation in Nigeria. It also examines the causes and implications of electoral violence on the electorate, entire community and Nigeria’s political system. The adopted research methodology is desktop research, where information was obtained from journals, textbooks, conference papers and others. The findings of the study revealed a link between small
APA, Harvard, Vancouver, ISO, and other styles
34

Cvetković, Vladimir M., Milan Lipovac, Renate Renner, Svetlana Stanarević, and Zlatko Raonić. "A Predictive Framework for Understanding Multidimensional Security Perceptions Among Students in Serbia: The Role of Institutional, Socio-Economic, and Demographic Determinants of Sustainability." Sustainability 17, no. 11 (2025): 5030. https://doi.org/10.3390/su17115030.

Full text
Abstract:
This study investigates and forecasts multidimensional security perceptions among Serbian university students, who are a particularly engaged and vulnerable demographic in transitional societies. It examines how demographic traits, socio-economic status, and levels of institutional trust and engagement shape students’ evaluations of security in everyday life. The study examines six primary dimensions of security perception: personal safety, safety at public events and demonstrations, perceived national threats, digital security and privacy, perception of emergencies and crises, and trust in in
APA, Harvard, Vancouver, ISO, and other styles
35

Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.

Full text
Abstract:
This research aims to understand the Influence of security, privacy, and reputation toward trust in online shopping consumer. The purpose of this research are: (1) the effect of security toward trust in online shopping consumer, (2) The effect of privacy toward trust in online shopping consumer, (3) The effect of reputation toward trust in online shopping consumer, (4) The effect of security, privacy, and reputation toward trust in online shopping consumer. The type of research used in this study was a causal quantitative research. The population in this study was citizens of Padang city, that
APA, Harvard, Vancouver, ISO, and other styles
36

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Full text
Abstract:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can b
APA, Harvard, Vancouver, ISO, and other styles
37

Wenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.

Full text
Abstract:
This article looks into the meaning of the concepts of sincere cooperation, mutual trust, and mutual recognition in EU social security coordination. It analyses the legislative choice of coordination as the main regulatory mechanism in the field, and examines the role of administrative cooperation. Furthermore, the article highlights the challenges that arise in situations where mutual recognition is required under the Regulations, as in connection with portable documents relating to the posting of workers. It also considers the limits to mutual trust via the principle of prohibition of fraud
APA, Harvard, Vancouver, ISO, and other styles
38

Khuspe, Snehal Tukaram. "A Study on the Impact of Cybersecurity Threats on Consumer Trust in E-Commerce: A Case of Navi Mumbai." International Journal of Economics, Business, Accounting, Agriculture and Management towards Paradigm Shift in Research (IJEBAMPSR) 2, no. 1 (2025): 172–76. https://doi.org/10.5281/zenodo.15294244.

Full text
Abstract:
<em>Abstract</em> <em>The rapid expansion of e-commerce has revolutionized the way consumers engage in online transactions. However, cybersecurity threats such as data breaches, phishing attacks, identity theft, and online fraud have significantly impacted consumer trust. This study investigates the relationship between cybersecurity threats and consumer trust in e-commerce within Navi Mumbai. The research aims to analyze consumer awareness, the impact of security breaches on purchasing decisions, and the effectiveness of security measures adopted by e-commerce platforms. The findings suggest
APA, Harvard, Vancouver, ISO, and other styles
39

Kapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.

Full text
Abstract:
Blockchain deployments require efficient consensus models in order to be scaled for larger networks. Existing consensus models either use stake-levels, trust-levels, authority-levels, etc. or their combinations in order to reduce mining delay while maintaining higher security levels. But these models either have higher energy requirements, lower security, or have linear/exponential relationship between mining delay and length of the chains. Due to these restrictions, the applicability of these models is affected when deployed under real-time network scenarios. To overcome these issues, this te
APA, Harvard, Vancouver, ISO, and other styles
40

Doton, Wlson. "THE ROLE OF DATA SECURITY IN THE WORLD OF EDUCATION TO INCREASE PARENTAL TRUST." Educational Researcher Journal 1, no. 3 (2024): 41–48. https://doi.org/10.71288/educationalresearcherjournal.v1i3.19.

Full text
Abstract:
This study investigates the role of data security in enhancing parental trust within educational institutions. Employing a qualitative descriptive approach, data was collected through in-depth interviews with key stakeholders (principals, teachers, IT staff, and parents), direct observations of school environments, and analysis of relevant documentation. Thematic analysis revealed several key findings: Clear and comprehensive data security policies significantly contribute to parental trust. Active parental involvement in data security discussions fosters greater trust and understanding. Paren
APA, Harvard, Vancouver, ISO, and other styles
41

Udayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.

Full text
Abstract:
The purpose of this study is to test and find out and determine the effect of perceived security and information quality on online purchase intention through trust in a reliable online store. The effect of perceived security on trust in Sorabel, the effect of information quality on trust in sorabel, the effect of perceived security on online purchase intention, the effect of information quality on online purchase intention and the influence of trust on online purchase intention. This research is quantitative. The population is Sorabel consumers in Yogyakartas. Samples were taken using a probal
APA, Harvard, Vancouver, ISO, and other styles
42

Patel, Jay. "Prospects of Cloud-Driven Deep Learning- Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 57–63. https://doi.org/10.55083/irjeas.2020.v08i03011.

Full text
Abstract:
The combination of cloud computing and deep learning models is changing the field of artificial intelligence (AI), facilitating more scalable, efficient, and adaptable systems for intricate data-driven activities. Nonetheless, as AI systems grow more powerful and widespread, guaranteeing their safety and security continues to be a significant challenge. This document investigates the future of cloud-based deep learning, specifically emphasizing innovative approaches to guarantee AI safety and security. We explore the capabilities of cloud-based systems in facilitating extensive deep learning m
APA, Harvard, Vancouver, ISO, and other styles
43

Urmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.

Full text
Abstract:
There have been multiple studies detailing mobile payment and its market potential. There is a gap in the literature when it comes to the study of acceptance factors focusing on security and trust. The researchers asked which qualities of security have an influence on the acceptance of a mobile payment service provider. Therefore this study will focus on distinguishing security in two dimensions: objective and subjective security. Objective security represents the user's perception of existing technical safety mechanisms. Subjective security is intangible, based on the user's feelings and perc
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Guangxuan, Liping Ding, Jin Du, et al. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.

Full text
Abstract:
In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides
APA, Harvard, Vancouver, ISO, and other styles
45

Leahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.

Full text
Abstract:
Containerisation is quickly becoming an accepted industry standard for development environments and Gartner, in a recent market forecast, estimated that by 2022 more than 75% of organisations will be using containers in production deployments. With this explosion in growth comes an added focus on security and best practices for using containers. The use of containers, in particular Docker containers, has altered some of the more traditional deployment paradigms by giving control of deployments to the development teams. This has massively benefited the DevOps release cycle, but at the expense o
APA, Harvard, Vancouver, ISO, and other styles
46

Syed, (Shawon) M. Rahman, and Lackey Robert. "E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 193–210. https://doi.org/10.5281/zenodo.4059648.

Full text
Abstract:
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with security incidents and preventing future attacks. Most small businesses do not have the capabilities of dealing with incidents the way large organizations do. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of consumers, partners and stakeholders. Many security stand
APA, Harvard, Vancouver, ISO, and other styles
47

D., Maheswari, and G. K. Kamalam Dr. "ART: AN ATTACK-RESISTANT TRUST MANAGEMENT SCHEME FOR MISBEHAVIOR DETECTION IN VANET." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 29–34. https://doi.org/10.5281/zenodo.345656.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) have the potential to transform the way in which the people can travel through the creation of a safe interoperable wireless communication networks (cars, buses, traffic signals, cell phones, and other devices). In Base Line Weighted Voting (BLWV) method, it calculates only the trust value on each node by separate weight calculation of nodes. The proposed Attack-Resistant Trust Management (ART) scheme evaluates the trustworthiness of traffic data and vehicle nodes in VANETs and also easily detects the various malicious attacks. In ART scheme, Dumpster’s rule
APA, Harvard, Vancouver, ISO, and other styles
48

Ma, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (2024): 163. http://dx.doi.org/10.3390/fi16050163.

Full text
Abstract:
Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor–Critic (SAC) algorithm with prioritized experience replay for inventory optimization an
APA, Harvard, Vancouver, ISO, and other styles
49

Nitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.

Full text
Abstract:
This study aims to determine the effect of trust as a mediating variable between security and perceived risk on consumer buying interest, and to determine the effect between security, perceived risk, and trust on consumer buying interest in Lazada consumers in Surabaya. This research method is quantitative. The sample in this study was 90 respondents using a non-probability sampling technique and the analytical tool used was SmartPLS 3.0. The results showed, a) that the path coefficient value of the security variable on trust was 0.512 and the p-value was 0.001, so the results of the study wer
APA, Harvard, Vancouver, ISO, and other styles
50

S.Rajaram. "Secure Routing Path Using Trust Values for Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 10. https://doi.org/10.5281/zenodo.7407765.

Full text
Abstract:
Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust level of a node is important. In this paper we focused about indirect trust mechani
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!