To see the other types of publications on this topic, follow the link: Trust model.

Dissertations / Theses on the topic 'Trust model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Trust model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kramdi, Seifeddine. "A modal approach to model computational trust." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30146/document.

Full text
Abstract:
Le concept de confiance est un concept sociocognitif qui adresse la question de l'interaction dans les systèmes concurrents. Quand la complexité d'un système informatique prohibe l'utilisation de solutions traditionnelles de sécurité informatique en amont du processus de développement (solutions dites de type dur), la confiance est un concept candidat, pour le développement de systèmes d'aide à l'interaction. Dans cette thèse, notre but majeur est de présenter une vue d'ensemble de la discipline de la modélisation de la confiance dans les systèmes informatiques, et de proposer quelques modèles logiques pour le développement de module de confiance. Nous adoptons comme contexte applicatif majeur, les applications basées sur les architectures orientées services, qui sont utilisées pour modéliser des systèmes ouverts telle que les applications web. Nous utiliserons pour cela une abstraction qui modélisera ce genre de systèmes comme des systèmes multi-agents. Notre travail est divisé en trois parties, la première propose une étude de la discipline, nous y présentons les pratiques utilisées par les chercheurs et les praticiens de la confiance pour modéliser et utiliser ce concept dans différents systèmes, cette analyse nous permet de définir un certain nombre de points critiques, que la discipline doit aborder pour se développer. La deuxième partie de notre travail présente notre premier modèle de confiance. Cette première solution basée sur un formalisme logique (logique dynamique épistémique), démarre d'une interprétation de la confiance comme une croyance sociocognitive, ce modèle présentera une première modélisation de la confiance. Apres avoir prouvé la décidabilité de notre formalisme. Nous proposons une méthodologie pour inférer la confiance en des actions complexes : à partir de notre confiance dans des actions atomiques, nous illustrons ensuite comment notre solution peut être mise en pratique dans un cas d'utilisation basée sur la combinaison de service dans les architectures orientées services. La dernière partie de notre travail consiste en un modèle de confiance, où cette notion sera perçue comme une spécialisation du raisonnement causal tel qu'implémenté dans le formalisme des règles de production. Après avoir adapté ce formalisme au cas épistémique, nous décrivons trois modèles basés sur l'idée d'associer la confiance au raisonnement non monotone. Ces trois modèles permettent respectivement d'étudier comment la confiance est générée, comment elle-même génère les croyances d'un agent et finalement, sa relation avec son contexte d'utilisation
The concept of trust is a socio-cognitive concept that plays an important role in representing interactions within concurrent systems. When the complexity of a computational system and its unpredictability makes standard security solutions (commonly called hard security solutions) inapplicable, computational trust is one of the most useful concepts to design protocols of interaction. In this work, our main objective is to present a prospective survey of the field of study of computational trust. We will also present two trust models, based on logical formalisms, and show how they can be studied and used. While trying to stay general in our study, we use service-oriented architecture paradigm as a context of study when examples are needed. Our work is subdivided into three chapters. The first chapter presents a general view of the computational trust studies. Our approach is to present trust studies in three main steps. Introducing trust theories as first attempts to grasp notions linked to the concept of trust, fields of application, that explicit the uses that are traditionally associated to computational trust, and finally trust models, as an instantiation of a trust theory, w.r.t. some formal framework. Our survey ends with a set of issues that we deem important to deal with in priority in order to help the advancement of the field. The next two chapters present two models of trust. Our first model is an instantiation of Castelfranchi & Falcone's socio-cognitive trust theory. Our model is implemented using a Dynamic Epistemic Logic that we propose. The main originality of our solution is the fact that our trust definition extends the original model to complex action (programs, composed services, etc.) and the use of authored assignment as a special kind of atomic actions. The use of our model is then illustrated in a case study related to service-oriented architecture. Our second model extends our socio-cognitive definition to an abductive framework that allows us to associate trust to explanations. Our framework is an adaptation of Bochman's production relations to the epistemic case. Since Bochman approach was initially proposed to study causality, our definition of trust in this second model presents trust as a special case of causal reasoning, applied to a social context. We end our manuscript with a conclusion that presents how we would like to extend our work
APA, Harvard, Vancouver, ISO, and other styles
2

Almoaber, Basmah. "Bootstrapping Trust Evaluation Using a Trust Certificate Model." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32141.

Full text
Abstract:
Trust plays a vital role in the decision to initiate any interaction. Rational agents may use past experiences and other agents’ opinions to decide to trust, but due to the nature of open multi-agent systems, where agents can dynamically join and leave the system at any time, agents may find themselves dealing with complete strangers whom neither they nor their friends have encountered before. This situation forces the agents to choose partners randomly, which significantly increases the risk of encountering unreliable agents. For instance, service requesters may become reluctant to initiate communication with newly-joined service providers. And when the newcomers are service requesters, who are willing to exploit the environment, service providers may also hesitate to start any connection with them. As a result, newcomers are excluded from the competition and old agents lose the possibility of interacting with better agents. In this thesis, we address that issue by creating a Trust Certificate (TC) model in which each agent is equipped with a certificate that works as a reference by providing information about its holder. The information is obtained and stored by the agent itself and is available to other agents who request it to evaluate the holder’s trustworthiness for a potential interaction. The stored information is about the agent’s role in the society and its performance in past interactions. The TC model allows agents to retrieve reputation information and make initial trust evaluations when evidence is unavailable. It also helps agents to avoid the need to make random partner selection due to the information scarcity. We show how this model enhances the interaction process between agents by evaluating it in the context of a simulated multi-agent system.
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Jianqiang. "A trust model with statistical foundation." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/27038.

Full text
Abstract:
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In the face of increasing uncertainty and risk, users and machines must be allowed to reason effectively about the trustworthiness of other entities. In this thesis, we propose a trust model that assists users and machines with decision-making in online interactions by using past behavior as a predictor of likely future behavior. We develop a general method to automatically compute trust based on self-experience and the recommendations of others. Our trust model solves the problem of recommendation combination and detection of unfair recommendations. Our approach involves data analysis methods (Bayesian estimation, Dirichlet distribution), and machine learning methods (Weighted Majority Algorithm). Furthermore, we apply our trust model to several utility models to increase the accuracy of decision-making in different contexts of Web Services. We describe simulation experiments to illustrate its effectiveness, robustness and the evolution of trust.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Xin. "Trust in national identification systems a trust model based on the TRA/TPB /." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Dissertations/summer2004/Xin%5FLi%5F071304.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ZHU, Peihu. "An improved model for trust-aware recommender systems based on multi-faceted trust." Digital Commons @ Lingnan University, 2016. https://commons.ln.edu.hk/cds_etd/15.

Full text
Abstract:
As customers enjoy the convenience of online shopping today, they face the problem of selecting from hundreds of thousands of products. Recommender systems, which make recommendations by matching products to customers based on the features of the products and the purchasing history of customers, are increasingly being incorporated into e-commerce websites. Collaborative filtering is a major approach to design algorithms for these systems. Much research has been directed toward enhancing the performance of recommender systems by considering various psychological and behavioural factors affecting the behaviour of users, e.g. trust and emotion. While e-commerce firms are keen to exploit information on social trust available on social networks to improve their services, conventional trust-aware collaborative filtering does not consider the multi-facets of social trust. In this research, we assume that a consumer tends to trust different people for recommendations on different types of product. For example, a user trusts a certain reviewer on popular items but may not place as much trust on the same reviewer on unpopular items. Furthermore, this thesis postulates that if we, as online shoppers, choose to establish trust on an individual while we ourselves are reviewing certain products, we value this individual’s opinions on these products and we most likely will value his/her opinions on similar products in future. Based on the above assumptions, this thesis proposes a new collaborative filtering algorithm for deriving multi-faceted trust based on trust establishment time. Experimental results based on historical data from Epinions show that the new algorithm can perform better in terms of accuracy when compared with conventional algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.

Full text
Abstract:
Introducing trust and reputation into multi-agent systems can significantly improve the quality and efficiency of the systems. The computational trust and reputation also creates an environment of survival of the fittest to help agents recognize and eliminate malevolent agents in the virtual society. The thesis redefines the computational trust and analyzes its features from different aspects. A systematic model called Neural Trust Model for Multi-agent Systems is proposed to support trust learning, trust estimating, reputation generation, and reputation propagation. In this model, the thesis innovates the traditional Self Organizing Map (SOM) and creates a SOM based Trust Learning (STL) algorithm and SOM based Trust Estimation (STE) algorithm. The STL algorithm solves the problem of learning trust from agents' past interactions and the STE solve the problem of estimating the trustworthiness with the help of the previous patterns. The thesis also proposes a multi-agent reputation mechanism for generating and propagating the reputations. The mechanism exploits the patterns learned from STL algorithm and generates the reputation of the specific agent. Three propagation methods are also designed as part of the mechanism to guide path selection of the reputation. For evaluation, the thesis designs and implements a test bed to evaluate the model in a simulated electronic commerce scenario. The proposed model is compared with a traditional arithmetic based trust model and it is also compared to itself in situations where there is no reputation mechanism. The results state that the model can significantly improve the quality and efficacy of the test bed based scenario. Some design considerations and rationale behind the algorithms are also discussed based on the results.
APA, Harvard, Vancouver, ISO, and other styles
7

Guirguis, Michel. "A multifactor model of investment trust discounts." Thesis, Bournemouth University, 2005. http://eprints.bournemouth.ac.uk/346/.

Full text
Abstract:
A closed-end fund, known as an investment trust in the UK and closed-end fund in the US, is a collective investment company that invests in shares of other companies. This study attempts to describe and explain the persistence of the excess discount return on UK investment trusts and US closed-end funds. The ability to identify which factors best capture return variation is central to applications of multifactor pricing models. So the main purpose of this thesis is the application of a multifactor risk model that will explain the-existence of the excess discount return. Hence, the title of the thesis: "A Multifactor Model of Investment Trust Discounts. A Comparative Study of UK Investment Trusts and US Closed-End Funds" First, the time-series properties of the closed-end funds' net asset values (NAVs) and discounts are investigated. In terms of normality, we find that the UK and US excess NAV returns and discounts are approximately normally distributed. In addition, through Augmented Dickey-Fuller tests, we find that the UK and US discounts are non-stationary, but the excess discount returns and the excess NAV returns are stationary. In terms of multicollinearity, we find that the independent variables included in our models are not closely correlated, so we do not have problems in using them in the regression models in Chapters 7 and 8. Finally, there are no significant differences in the discount during the month of January and other months. In Chapter 7, we study the importance of management performance in terms of excess NAV returns and discount persistence. We use three approaches: Fama and French's (1993) three-factor model, an extended Fama and French model which incorporates a market timing variable, and a performance persistence model used by Carhart (1997) and Dimson and Minio-Kozerski (2001). On average, the six-factor model developed in the thesis can explain 67% of the variation in the excess discount return in the UK market by taking into consideration the market effect, size, the book-to-market effect, momentum, sentiment and expenses. In contrast, Fama and French's (1993) three-factor and Carhart's (1997) four-factor models explain only 42% of the variation of the excess discount return. Similarly, the six-factor model can explain 66% of the variation in the excess discount return in the US market by taking into consideration the same six independent variables. In contrast, Fama and French's (1993) three-factor model explains 59% of the excess discount return variation and Carhart's (1997) four-factor model explains 65% of the variation.
APA, Harvard, Vancouver, ISO, and other styles
8

Wongse-Ek, Woraluck. "Towards a trust model in e-learning." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/400246/.

Full text
Abstract:
When a student is faced with uncertainty in the trustworthiness of a learning activity to meet their intended learning goals, it may cause anxiety and a lack of confidence in the learning. A student’s trust in the learning activity is needed to reduce this uncertainty. This work develops a conceptual trust model for e-learning activities. The proposed student’s trust model is the Learning Outcome-based Trust (LOT) model. The antecedents of trust are represented based on the intended learning outcome (ILO) structures and are used to estimate the trustworthiness values of the learning activity. Once values based on the antecedents of trust are known, these values are used to assess how much the student can trust the learning activity. The LOT model was evaluate in two real learning situation: (1) where information about the trustworthiness of the learning activity was ambiguous, and (2) where information about the trustworthiness of the learning activity was clear. Students’ trust mainly related to their propensity to trust and their prior knowledge when the trustworthiness of the learning activity was ambiguous. In contrast, students’ trust mainly related to their perceived trustworthiness of the learning activity when the trustworthiness of the learning activity was clear. The LOT model showed significant prediction of student’s trust. In addition, when the student learning path was used, trust was predicted significantly better than when the learning path was not given. The LOT model may have useful application in recommendation systems or intelligent tutoring systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Zuppa, Diodoro. "Model for developing trust in construction management." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Popa, Clara L. "Initial Trust Formation in Temporary Small Task Groups: Testing a Model of Swift Trust." [Kent, Ohio] : Kent State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1113573275.

Full text
Abstract:
Thesis (Ph.D.)--Kent State University, 2005.
Title from PDF t.p. (viewed Sept. 12, 2006). Advisor: Rebecca R. Rubin. Keywords: temporary groups; swift trust; trust; organizational task groups. Includes survey instruments. Includes bibliographical references (p. 113-121).
APA, Harvard, Vancouver, ISO, and other styles
11

Blair, Bryan W. ""Trust me, I'm the principal!" : a new conceptual model of trust for educational leaders /." Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd2047.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Yinan Information Technology &amp Electrical Engineering Australian Defence Force Academy UNSW. "W3 Trust Model (W3TM): a trust-profiling framework to assess trust and transitivity of trust of web-based services in a heterogeneous web environment." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Information Technology and Electrical Engineering, 2005. http://handle.unsw.edu.au/1959.4/38655.

Full text
Abstract:
The growth of eCommerce is being hampered by a lack of trust between providers and consumers of Web-based services. While Web trust issues have been addressed by researchers in many disciplines, a comprehensive approach has yet to be established. This thesis proposes a conceptual trust-profiling framework???W3TF???which addresses issues of trust and user confidence through a range of new user-centred trust measures???trust categories, trust domains, transitivity of trust, fading factor analysis, standalone assessment, hyperlinked assessment and relevance assessment. While others now use the concept of transitivity of trust, it was first introduced by this research in 1998. The thesis also illustrates how W3TF can narrow the gap/disconnection between the hierarchical PKI trust environment and the horizontal Web referral environment. The framework incorporates existing measures of trust (such as Public Key Infrastructure), takes account of consumer perceptions by identifying trust attributes, and utilises Web technology (in the form of metadata), to create a practical, flexible and comprehensive approach to trust assessment. The versatility of the W3TF is demonstrated by applying it to a variety of cases from trust literature and to the hypothetical case study that provided the initial stimulus for this research. It is shown that the framework can be expanded to accommodate new trust attributes, categories and domains, and that trust can be ???weighed??? (and therefore evaluated) by using various mathematical formulae based on different theories and policies. The W3TF addresses identified needs, narrows the gaps in existing approaches and provides a mechanism to embrace current and future efforts in trust management. The framework is a generic form of trust assessment that can help build user confidence in an eCommerce environment. For service providers, it offers an incentive to create websites with a high number of desired trust attributes. For consumers, it enables more reliable judgments to be made. Hence, Web trust can be enhanced.
APA, Harvard, Vancouver, ISO, and other styles
13

Patacchiola, Massimiliano. "A developmental model of trust in humanoid robots." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12828.

Full text
Abstract:
Trust between humans and artificial systems has recently received increased attention due to the widespread use of autonomous systems in our society. In this context trust plays a dual role. On the one hand it is necessary to build robots that are perceived as trustworthy by humans. On the other hand we need to give to those robots the ability to discriminate between reliable and unreliable informants. This thesis focused on the second problem, presenting an interdisciplinary investigation of trust, in particular a computational model based on neuroscientific and psychological assumptions. First of all, the use of Bayesian networks for modelling causal relationships was investigated. This approach follows the well known theory-theory framework of the Theory of Mind (ToM) and an established line of research based on the Bayesian description of mental processes. Next, the role of gaze in human-robot interaction has been investigated. The results of this research were used to design a head pose estimation system based on Convolutional Neural Networks. The system can be used in robotic platforms to facilitate joint attention tasks and enhance trust. Finally, everything was integrated into a structured cognitive architecture. The architecture is based on an actor-critic reinforcement learning framework and an intrinsic motivation feedback given by a Bayesian network. In order to evaluate the model, the architecture was embodied in the iCub humanoid robot and used to replicate a developmental experiment. The model provides a plausible description of children's reasoning that sheds some light on the underlying mechanism involved in trust-based learning. In the last part of the thesis the contribution of human-robot interaction research is discussed, with the aim of understanding the factors that influence the establishment of trust during joint tasks. Overall, this thesis provides a computational model of trust that takes into account the development of cognitive abilities in children, with a particular emphasis on the ToM and the underlying neural dynamics.
APA, Harvard, Vancouver, ISO, and other styles
14

Alhamad, Mohammed. "SLA-based trust model for secure cloud computing." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1189.

Full text
Abstract:
Cloud computing has changed the strategy used for providing distributed services to many business and government agents. Cloud computing delivers scalable and on-demand services to most users in different domains. However, this new technology has also created many challenges for service providers and customers, especially for those users who already own complicated legacy systems. This thesis discusses the challenges of, and proposes solutions to, the issues of dynamic pricing, management of service level agreements (SLA), performance measurement methods and trust management for cloud computing.In cloud computing, a dynamic pricing scheme is very important to allow cloud providers to estimate the price of cloud services. Moreover, the dynamic pricing scheme can be used by cloud providers to optimize the total cost of cloud data centres and correlate the price of the service with the revenue model of service. In the context of cloud computing, dynamic pricing methods from the perspective of cloud providers and cloud customers are missing from the existing literature. A dynamic pricing scheme for cloud computing must take into account all the requirements of building and operating cloud data centres. Furthermore, a cloud pricing scheme must consider issues of service level agreements with cloud customers.I propose a dynamic pricing methodology which provides adequate estimating methods for decision makers who want to calculate the benefits and assess the risks of using cloud technology. I analyse the results and evaluate the solutions produced by the proposed scheme. I conclude that my proposed scheme of dynamic pricing can be used to increase the total revenue of cloud service providers and help cloud customers to select cloud service providers with a good quality level of service.Regarding the concept of SLA, I provide an SLA definition in the context of cloud computing to achieve the aim of presenting a clearly structured SLA for cloud users and improving the means of establishing a trustworthy relationship between service provider and customer. In order to provide a reliable methodology for measuring the performance of cloud platforms, I develop performance metrics to measure and compare the scalability of the virtualization resources of cloud data centres. First, I discuss the need for a reliable method of comparing the performance of various cloud services currently being offered. Then, I develop a different type of metrics and propose a suitable methodology to measure the scalability using these metrics. I focus on virtualization resources such as CPU, storage disk, and network infrastructure.To solve the problem of evaluating the trustworthiness of cloud services, this thesis develops a model for each of the dimensions for Infrastructure as a Service (IaaS) using fuzzy-set theory. I use the Takagi-Sugeno fuzzy-inference approach to develop an overall measure of trust value for the cloud providers. It is not easy to evaluate the cloud metrics for all types of cloud services. So, in this thesis, I use Infrastructure as a Service (IaaS) as a main example when I collect the data and apply the fuzzy model to evaluate trust in terms of cloud computing. Tests and results are presented to evaluate the effectiveness and robustness of the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
15

Eason, John P. "A Trust Region Filter Algorithm for Surrogate-based Optimization." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1145.

Full text
Abstract:
Modern nonlinear programming solvers can efficiently handle very large scale optimization problems when accurate derivative information is available. However, black box or derivative free modeling components are often unavoidable in practice when the modeled phenomena may cross length and time scales. This work is motivated by examples in chemical process optimization where most unit operations have well-known equation oriented representations, but some portion of the model (e.g. a complex reactor model) may only be available with an external function call. The concept of a surrogate model is frequently used to solve this type of problem. A surrogate model is an equation oriented approximation of the black box that allows traditional derivative based optimization to be applied directly. However, optimization tends to exploit approximation errors in the surrogate model leading to inaccurate solutions and repeated rebuilding of the surrogate model. Even if the surrogate model is perfectly accurate at the solution, this only guarantees that the original problem is feasible. Since optimality conditions require gradient information, a higher degree of accuracy is required. In this work, we consider the general problem of hybrid glass box/black box optimization, or gray box optimization, with focus on guaranteeing that a surrogate-based optimization strategy converges to optimal points of the original detailed model. We first propose an algorithm that combines ideas from SQP filter methods and derivative free trust region methods to solve this class of problems. The black box portion of the model is replaced by a sequence of surrogate models (i.e. surrogate models) in trust region subproblems. By carefully managing surrogate model construction, the algorithm is guaranteed to converge to true optimal solutions. Then, we discuss how this algorithm can be modified for effective application to practical problems. Performance is demonstrated on a test set of benchmarks as well as a set of case studies relating to chemical process optimization. In particular, application to the oxycombustion carbon capture power generation process leads to significant efficiency improvements. Finally, extensions of surrogate-based optimization to other contexts is explored through a case study with physical properties.
APA, Harvard, Vancouver, ISO, and other styles
16

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Full text
Abstract:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UBT) evaluation is a valid method to solve security dilemmas of identity-based access control system, but current studies of UBT based access control model is still not mature enough, existing the problems like UBT evaluation complexity, trust dynamic update efficiency, evaluation accuracy, etc. Objective. The aim of the study is to design and develop an improved UBT based CC access control model compare to the current state-of-art. Including an improved UBT evaluation method, able to reflect the user’s credibility according to the user’s interaction behavior, provides access control model with valid evidence to making access control decision; and a dynamic authorization control and re-allocation strategy, able to timely response to user’s malicious behavior during entire interaction process through real-time behavior trust evaluation. Timely updating CSUs trust value and re-allocating authority degree. Methods. This study presented a systematical literature review (SLR) to identify the working structure of UBT based access control model; summarize the CSUs’ behaviors that can be collected as UBT evaluation evidence; identify the attributes of trust that will affect the accuracy of UBT evaluation; and evaluated the current state-of-art of UBT based access control models and their potential advantages, opportunities, and weaknesses. Using the acquired knowledge, design a UBT based access control model, and adopt prototype method to simulate the performance of the model, in order to verify its validation, verify improvements, and limitations. Results. Through the SLR, two types of UBT based access control model working structures are identified and illustrated, essential elements are summarized, and a dynamic trust and access update module is described; 23 CSU’s behavior evidence items are identified and classified into three classes; four important trust attributes, influences, and corresponding countermeasures are identified and summarized; and eight current state-of-art of UBT based access control models are identified and evaluated. A Triple Dynamic Window based Access Control model (TDW) was designed and established as a prototype, the simulation result indicates the TDW model is well performed on the trust fraud problem and trust expiration problem. Conclusions. From the research results that we obtained from this study, we have identified several basic elements of UBT evaluation method, evaluated the current state-of-art UBT based access control models. Towards the weaknesses of trust fraud prevention and trust expiration problem, this paper designed a TDW based access control model. In comparing to the current state-of-art of UBT models, the TDW model has the following advantages, such as it is effectively preventing trust fraud problem with “slow rise” principle, able to timely response to malicious behavior by constantly aggravate punishment strategy (“rapid decrease” principle), effectively prevent malicious behavior and malicious user, and able to reflect the recent credibility of accessing user by expired trust update strategy and most recent trust calculation; finally, it has simple and customizable data structure, simple trust evaluation method, which has good scalability.
APA, Harvard, Vancouver, ISO, and other styles
17

Peterson, Minzette. "Attachment Style, Trust, and Exchange Orientation: A Mediational Model." Fogler Library, University of Maine, 2001. http://www.library.umaine.edu/theses/pdf/PetersonM2001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Tang, Hon Cheong 1980. "Gravity-based trust model for web-based social networks." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=112366.

Full text
Abstract:
Web-based social networks have become one of the most popular applications on the Internet in recent years. However, most of the social networks rely on some simplistic trust models to manage trust information of the users, which can cause problems ranging from unsatisfied user experience to exposure to malicious users. This thesis proposes a gravity-based trust model to enhance the aggregation of personal trust information into a subjective reputation system. This new model maps all users on the social network into n-dimensional Euclidean spaces based on their direct trust information, and creates a trust social neighborhood for each user. The reputation of a target user is determined by applying gravity model to the information from both target's and observer's trust social neighborhood. A prototype of this trust model is implemented in order to evaluate the effects of varying different parameters of the gravity-based trust model.
APA, Harvard, Vancouver, ISO, and other styles
19

Laguisma, Julian James L. "Developing An Efficient High-Trust Model Within Audit Teams." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Menfors, Martina, and Felicia Fernstedt. "Consumer trust in online reviews : a communication model perspective." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-948.

Full text
Abstract:
Konsumenter använder och förlitar sig i allt större utsträckning på andras åsikter som lagtsupp på recensionssidor på nätet. Nyligen har dock skandaler uppmärksammat förekomsten avmanipulation av recensioner vilket lett till att recensionssajters trovärdighet kan ifrågasättas.Tidigare forskning har också gett tvetydiga svar på huruvida folk litar på recensioner ellerinte.Att utforska det här ämnet är viktigt eftersom marknadsförare måste förstå sig påkonsumenters förtroende för onlinerecensioner då dessa kan användas som ett kraftfulltmarknadsföringsverktyg och som ett nytt element i marknadsföringsmixen. Den här studiensyftar till att utforska konsumenters förtroende för onlinerecensioner genom att undersökavarför man litar på recensioner och vad som gör en onlinerecension pålitlig. Genomanvändandet av en modifierad version av Shannon och Weavers kommunikationsmodell, kanen recension struktureras kring elementen meddelande, sändare, mottagare, kanal ochåterkoppling. Den här studien implementerar en kvalitativ metod där semistruktureradeintervjuer använts för att få en djupare förståelse för intervjuobjektens känslor och tankar.Studiens resultat indikerar att konsumenter inte litar på individuella recensioner, utan snararepå systemet med onlinerecensioner i sin helhet; antalet recensioner nämndes som den mestinflytelserika faktorn för att skapa tillit. Studien visar också att den som läser recensionerframförallt använder meddelandet för att avgöra om en recension är pålitlig eller inte. Pågrund av avsaknaden av information om personen som skriver recensionen är meddelandetdet enda läsaren verkligen kan utvärdera.
Increasingly, consumers are using and relying on the opinions of others posted on onlinereview sites. However, recent scandals has brought attention to the existence of reviewmanipulation and questioned the credibility of online review sites. Furthermore, previousresearch has shown conflicting findings on whether or not consumers trust online reviews.Exploring these matters becomes important since marketers need to be able to understandconsumer trust in online reviews as it then can be used as a powerful marketing tool and as anew element of the marketing communication mix. The aim of this study is to exploreconsumer trust in online reviews by investigating why people trust online reviews, and whatmakes an online review trustworthy. This is accomplished using a modified version of theShannon and Weaver communication model which is structured around the elementsmessage, sender, receiver, channel and feedback. The study employs a qualitative methodusing semi-structured interviews in order to gain a deeper understanding of the thoughts andfeelings of the interviewees. The findings indicate that consumers do not put their trust inindividual reviews, but in the online review system as a whole; the number of reviews postedwas mentioned as the most influential factor for creating trust. The study shows that readersof reviews primarily use the message to determine whether a review is trustworthy or not.Because of the lack of information about the person writing the online review, it is the onlything the reader can truly evaluate.
APA, Harvard, Vancouver, ISO, and other styles
21

Junior, Etienne Américo Cartolano. "A model for trust under a suitcase word perspective." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-16082017-151433/.

Full text
Abstract:
Trust is a social phenomenon fundamental to relationships and a building block of our society. People experience it daily, such as in a borrowing between friends, in an e-commerce transaction, in a mother-son relationship, in a connection between autonomous agents, or to show faith in God (\"In God we trust\"). In the specific case of Biodiversity domain, trust is one of the pillars of the Citizen Science projects, which are helping to solve the lack of biodiversity data by engaging citizens to work as volunteers to address this problem. Measuring and simulating levels of trust on these projects might reveal or anticipate losses; for example, the disposal of data because a deficit of trust on the technical capacity of the volunteers, opening an opportunity to manage and improve it. However, trust is a hard concept to define. The word \'trust\' may carry different meanings, such as honesty, security, integrity, competence, etc. and this is an attribute of the \'suitcase words\'. Adopting the \'suitcase\' perspective would change the way as we define, model, and simulate trust, once people would identify, decode, and simulate many meanings of trust with a single approach. In this scenario, the main objective of our research was to verify the hypotheses 1) that trust is a suitcase word, and 2) that trust can be modeled and simulated under a suitcase word perspective. A network analysis of the Web of Science citation database was able to confirm the hypothesis that trust is a suitcase word, since a distribution analysis of articles showed that trust occurs across a wide range of disciplines, and since co-occurrence maps of keywords showed that trust meanings from these disciplines may be significantly different. To verify the second hypothesis, we proposed a framework to manage trust with three components: 1) a suitcase model to identify different meanings of trust, which is the main purpose of this work, 2) a procedure to detail trust situations in terms of the suitcase model, and 3) a behavioral decision model of confidence, which was required for our simulation, since trust and control play complementary roles in the development of confidence, and consequently, to generate a confident behavior to cooperate. In our suitcase model the decision to trust (or distrust) the trustee depends on the trustors\' general capacity to take risks (= trustfulness) and on the assessment of trustee\'s interests and capacity to behavior as the trustor expects (= trustworthiness). In a practical and workable way, trustworthiness was considered a function of the trustor\'s expectations (expected evidence) and the trustee\'s previous behavior (collected evidence) for each situation. We proposed a formalism to the suitcase model, and then replicated the PlayGround simulator to modify it and incorporate our model. The new simulator, the PlayGround 2.0, was used to run a case study using trust situations from Citizen Science projects. Our main goal with this case study was to test the hypothesis that trust can be simulated under a suitcase perspective. A successful simulation would plot agents in the field reacting differently according to each situation. Results were as expected, what demonstrated the comprehensive utility of our model, with potential to handle different meanings of trust in the context of Citizen Science in the Biodiversity domain.
Trust, que em português não possui uma tradução que reflita a sua complexidade, é um fenômeno fundamental para os relacionamentos e uma peça fundamental da nossa sociedade. Trust é vivenciada diariamente pelas pessoas, seja em um empréstimo entre amigos, em uma transação de comércio eletrônico, na relação entra uma mãe e um filho, na conexão entre agentes autônomos, ou para demonstrar a nossa fé. No caso específico da ciência da Biodiversidade, trust é um dos pilares dos projetos de Ciência Cidadã, que ajudam a resolver a falta de dados de biodiversidade engajando cidadãos para trabalhar como voluntários para solucionar o problema. Medir e simular trust nestes projetos pode revelar ou antecipar perdas, por exemplo, o descarte de dados devido à falta de trust na capacidade técnica dos voluntários, abrindo oportunidades para sua gestão e incentivo. Contudo, trust é um conceito difícil de definir. A palavra pode carregar muitos significados, tais como honestidade, segurança, integridade, competência, etc., e esta é uma característica das suitcase words (palavras-mala). Adotar uma perspectiva de suitcase pode mudar a maneira como definimos, modelamos e simulamos trust, pois as pessoas poderiam identificar, decodificar, e simular vários significados de trust com uma única abordagem. Neste cenário, o objetivo principal desta pesquisa foi verificar as hipóteses de que 1) trust é uma suitcase word e de que 2) trust pode ser modelada e simulada em uma perspectiva de suitcase com potencial para manipulação de diferentes significados. Uma análise de distribuição utilizando o banco de dados Web of Science foi suficiente para confirmar a primeira hipótese de que trust é uma suitcase word, pois uma análise dos seus registros de citações mostrou que trust é estudado por muitas disciplinas da ciência, e além disso, mapas de co-ocorrência de palavraschaves mostraram que os significados de trust nas disciplinas podem ser diferentes. Para verificar a segunda hipótese, nós propusemos um framework com três componentes: 1) um \'modelo suitcase\' para identificar diferentes significados de trust, que é o objetivo principal deste trabalho, 2) um procedimento para detalhar as situações de trust em componentes do modelo suitcase, e 3) um modelo de decisão comportamental sobre confiança, que foi necessário para nossa simulação, uma vez que trust e controle tem papéis complementares no desenvolvimento da confiança, e consequentemente, na exibição de um comportamento de confiança que pode levar à cooperação. No nosso modelo, a decisão de trust o trustee (aquele a quem trust é direcionada) depende da capacidade do trustor (aquele que direciona trust) em aceitar riscos (= trustfulness), e da avaliação do interesse e da capacidade do trustee em agir como o esperado (= trustworthiness). De uma maneira prática, trustworthiness foi considerada como uma função das evidências esperadas e coletadas em cada situação. Nós propusemos um formalismo para o novo modelo, e depois replicamos um simulador chamado PlayGround para depois modificá-lo e incorporar o modelo suitcase. O novo simulador, o PlayGround 2.0, foi utilizado para rodar um estudo de caso utilizando situações comuns em projetos de Citizen Science. Nosso maior objetivo foi testar a hipótese de que trust poderia ser simulada em uma perspectiva de suitcase. Uma simulação bem-sucedida plotaria os agentes em campo reagindo diferentemente de acordo com as situações apresentadas. Os resultados foram como esperados, o que demonstrou a utilidade abrangente do nosso modelo, com potencial para lidar com diferentes significados de trust no contexto dos projetos de Ciência Cidadã para Biodiversidade, ou em outros contextos.
APA, Harvard, Vancouver, ISO, and other styles
22

Althuru, Dharan Kumar Reddy. "Distributed Local Trust Propagation Model and its Cloud-based Implementation." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1400649603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zetuny, Yonatan. "A synergistic reputation-policy based trust model for Grid resource selection." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90120/a-synergistic-reputation-policy-based-trust-model-for-grid-resource-selection.

Full text
Abstract:
In the context of Grid computing, reputation-based trust management systems are playing an increasingly important role for supporting coordinated resource sharing and ensuring provision of quality of service. However, the existing Grid reputation-based trust management systems are considered limited as they are bounded to esoteric reputation-based trust models encompassing predefined metrics for calculating and selecting trusted computing resources and as a result, they prevent external involvement in the trust and reputation evaluation processes. This thesis suggests an alternative approach for reputation modelling founded on its core argument proclaiming that reputation is a subjective matter as well as context dependent. Consequently, it offers a synergistic reputation-policy based trust model for Grid resource selection. This exoteric trust model introduces a novel paradigm for evaluating Grid resources, in which Grid client applications (e.g. monitoring toolkits and resource brokers) are endeavoured to carry out an active participation in the trust and reputation evaluation processes. This is achieved by augmenting the standard reputation queries with a set of reputation-policy assertions constituting as complete trust metrics supplied into the reputation algorithm. Consecutively, the Grid Reputation-Policy Trust management system (GREPTrust) provides a concrete implementation for the trust model and it’s underlying artifacts whilst the GREPTrust testbed provides an adequate infrastructure for comparing the reputationpolicy trust model with a production available esoteric model (GridPP). Based on a computational finance case study, an internal workflow simulation utilises the GREPTrust testbed in order to empirically assess the criteria by which the synergistic reputation-policy based trust model outperforms esoteric trust models regarding resource selection and consequently provides substantive evidence that the reputation-policy paradigm is a welcome addition to the Grid computing community.
APA, Harvard, Vancouver, ISO, and other styles
24

Whitmore, Corrie Baird. "Trust Development: Testing a New Model in Undergraduate Roommate Relationships." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37380.

Full text
Abstract:
Interpersonal trust reflects a vital component of all social relationships. Trust has been linked to a wide variety of individual and group outcomes in the literature, including personal satisfaction and motivation, willingness to take risks, and organizational success (Dirks & Ferrin, 2001; Pratt & Dirks, 2007; Simpson, 2007). In this dissertation I tested a new conceptual model evaluating the roles of attachment, propensity to trust, perceived similarity of trustee to self, and social exchange processes in trust development with randomly assigned, same-sex undergraduate roommates. Two hundred and fourteen first-year students (60% female, 85% Caucasian, mean age = 18) at a large south-eastern university completed self-report measures once per week during the first five weeks of the fall semester. Perceived similarity measured the second week of classes and social exchange measured three weeks later combined to provide the best prediction of participantsâ final trust scores. Attachment and propensity to trust, more distal predictors, did not have a significant relationship with trust. This study demonstrated that trust is strongly related to perceived similarity, as well as social exchange. A prime contribution of this study is the longitudinal, empirical test of a model of trust development in a new and meaningful relationship. Future work may build on this research design and these findings by focusing on early measurement of constructs, measuring dyads rather than individuals, and incorporating behavioral measures of trust.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
25

Tomlinson, Edward C. "Cheap talk, valuable results? A causal attribution model of the impact of promises and apologies on short-term trust recovery." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1085062874.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.
Title from first page of PDF file. Document formatted into pages; contains xi, 184 p.; also includes graphics. Includes abstract and vita. Advisor: Roy J Lewicki, Labor and Human Resources Graduate Program. Includes bibliographical references (p. 144-157).
APA, Harvard, Vancouver, ISO, and other styles
26

Pavlova, Evgeniya. "Trust Development in Distributed Teams: A Latent Change Score Model." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/4198.

Full text
Abstract:
Advances in collaborative work tools and communication technologies have made computer-mediated teams a part of virtually every organization. One of the challenges for members of virtual teams is the development of trust. This study examined the reciprocal relationship between trust and effectiveness in virtual teams, employing an input-process-output-input approach. Data were collected from 183 individuals comprising 61 teams. Teams participated in a computer-simulated search and rescue mission. Three alternative latent change score structural equation models were fit to the data to examine the bidirectional relationships between trust and effectiveness. Results revealed that the two factors of trust, cognition-based trust and affect-based trust, are always present, therefore examination of the trust-effectiveness relationship for each trust factor is warranted. The analyses revealed that generally, effectiveness has an impact on changes in trust, but trust does not influence the changes in effectiveness. Implications for organizations are discussed. Future research should examine the relationships between in trust and effectiveness on the team level. Additionally, research should explore the reciprocal relationship between each trust factors and effectiveness subtypes - attitudinal, behavioral, and performance effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
27

Patel, Jigar. "A trust and reputation model for agent-based virtual organisations." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/263318/.

Full text
Abstract:
The aim of this research is to develop a model of trust that will endeavour to assure good interactions amongst autonomous software agents in complex, networked environments. In this context, we identify the following as key characteristics. Firstly, such environments are open, meaning that agents are free to enter and exit the system at their will, so an agent cannot be aware of all of its interaction partners. Furthermore, there is a possibility that these interaction partners may be malicious or colluding agents. Secondly, the openness and dynamism of these environments means agents will need to interact with other agents, with which they have had no past experience. Even in this context, an agent must be able to accurately assess the trustworthiness of another. Thirdly, the distributed and heterogeneous nature of these systems influences any model or application developed for such environments. Specifically, this often requires models and applications to be decentralised. Lastly, many of the interactions that occur between agents in such systems are in the context of a virtual organisation (VO). Here VOs are viewed as collections of agents belonging to different organisations, in which each agent has a specific problem solving capability which when combined provides a particular service to meet the requirements of an end user. Now, VOs are social structures, and the presence of certain inter-agent relationships may influence the behaviour of certain members. For this reason it is important to consider not only personal experiences with an individual to determine its behaviour, but to also examine the social relationships that it has with other agents. Against this background, we have developed TRAVOS (A Trust and Reputation Model for Agent-Based Virtual Organisations) which focuses, in particular, on providing a measure of trust for an agent to place in an interaction partner. This measure of trust is calculated by considering the past experiences between the agent and its interaction partner. In instances when there is no personal experience, the model substitutes past experience with reputation information gathered from other agents in the society or from special reputation broker agents. Reputation is gathered in a way that filters out biased or false opinions. In addition to this, the model is constrained by issues of scalability and decentralisation. Furthermore, by extending TRAVOS we developed a set of mechanisms (TRAVOS-R) related to learning and exploiting the social relationships present in VO-rich environments. More specifically, TRAVOS-R presents a novel approach to learning the type of relationship present between two agents, and uses this knowledge to adjust the opinions obtained from one agent about the other. The TRAVOS models have been tested empirically and have significantly outperformed other similar models. Moreover, to further evaluate the applicability of our approach a realistic system evaluation was also carried out, which involved applying our models in an industrial application of agent-based VOs. In undertaking this research, we have shown that trust is a key component of networked systems and that a computational trust model can be used by agents in large, dynamic, uncertain and open environments to account for the uncertainty inherent in their social decision-making processes. More specifically, we have shown that by using personal experience, opinions from others, and knowledge of social relationships, an agent is able to arrive at a more accurate trust value, and, as a consequence, that it can interact in a more effective manner.
APA, Harvard, Vancouver, ISO, and other styles
28

Whitmore, Corrie Baird. "Development of trust in leadership: Exploring a cognitive process model." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32513.

Full text
Abstract:
This thesis explored the cognitive, character-inference process that Dirks & Skarlicki (2004) assert contributes to trust development. Self-reported transformational leadership, leader integrity, organizational justice, and leader prototypicality correlated positively with cognitive trust in this sample of 81 student employees (63% female, mean age 20.5) of a large southeastern university. Leader prototypicality, a cognitive evaluation process, partially mediated the relationship between leader integrity and trust. This studyâ s prime contribution was the longitudinal, empirical test of a model of trust development in interdependent leader-follower dyads. Future research may explore other antecedents of trust, assess how the cognitive process of trust development occurs, or investigate the relationship-based social exchange mechanism Dirks and Skarlicki (2004) suggest contributes to the development of affective trust.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
29

Dahlberg, Robert. "THE PROGRAM PATHING TRUST MODEL FOR CRITICAL SYSTEM PROCESS AUTHORIZATION." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/237.

Full text
Abstract:
Since computers are relied upon to run critical infrastructures – from nuclear power plants to electronic battlefield simulations – the concept of a “trusted” or tamperproof system has become even more important. Some applications have become so critical that it is imperative that they run as intended, without interference. The consequences of these systems not running as intended could be catastrophic. This research offers a solution for a key element for protecting these critical servers – validating process invocation sequences. The purpose of this research is to increase operating system security by detecting, validating, and enforcing process invocation sequences within a critical system. If the processes on a critical system are not those that are intended to run or support the critical system, or if a system is able to run processes in an unauthorized sequence, then the system is compromised and cannot be trusted. This research uses a computational theory approach to create a framework for a solution for the process invocation sequence problem. Using the Program Pathing Trust Model, a solution capable of identifying both valid and invalid process invocation sequences is developed.
APA, Harvard, Vancouver, ISO, and other styles
30

Coetzee, Marijke. "WSACT - a model for Web Services Access Control incorporating Trust." Thesis, Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-07102008-075251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dove, Meghan K., Johnnye Rogers, Michael O'Neal, Paul Fisher, Katy Gregg, and Alice Hall. "Family-Centric Model: Building Trust to Educate and Empower Families." Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/secfr-conf/2018/schedule/4.

Full text
Abstract:
The risk factors associated with intergenerational transmission of poverty have been well established within Family Science literature for decades. Multiple efforts have been extended at the community level to meet needs, however, few have been successful in breaking the cycle of poverty within families. In 2007, local civic leaders spent two years studying and comparing the efforts of surrounding service organizations and their impact on the multigenerational cycle of poverty in a metropolitan city in South Georgia. In 2011, findings lead to the creation of a unique family life education program that engaged families residing in inner-city neighborhoods to help family members with parenting skills. The design of the program focuses on helping families create safe, language-rich, interactive family environments for their children. The intention of this program is to enable family members to effectively serve as their children’s first teachers and prepare their preschool children for entry into kindergarten, however this program has also begun to impacted the community through the creation of leadership tracks for attendees who have shifted from learner to leader. With each year, participants lead the way to adding program elements, such as transportation, baby showers, and vision screening, to reach the needs of the community members and increase enrollment. This presentation will highlight the family-centric education model and data summary to date. Trust- and rapport-building along with empowering families and ultimately impacting the whole community will be emphasized as agents of change. This presentation will also include an overview of the history of this program and will discuss its unique attributes that has brought together people from across the community. The guiding principles of trust and respect among participants are central to all discussions, which has been found to be critical for the success of a program (Wiley & Ebata, 2004; Ballard & Taylor, 2012). This presentation will provide direction on how to empower participants by strengthening their voice in the program planning process. Insight into how this program can be replicated in areas across the United States will be discussed. In Fall 2017, an analysis and summary of previously collected data began and additional methodologies were added to better understand the quantifiable impact of the program thus far. Preliminary data analyses on participation revealed that from August 2013 to Summer 2017, which included more than 50 Saturday trainings, totaled 2,890 attendees. Each Saturday training averaged 60 learners with this increasing across time. The data collected in Fall 2017 provided more in-depth demographic information as well as more consistent pre-post evaluations of each training session. Data will be discussed to provide interesting insights into participant learning and the unique population being served. Data from the pilot through Fall 2017 will be presented confirming that through targeted outreach and resources, communities can be empowered.
APA, Harvard, Vancouver, ISO, and other styles
32

Tamang, Sujata. "Decentralized Reputation Model and Trust Framework Blockchain and Smart contracts." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393203.

Full text
Abstract:
Blockchain technology is being researched in diverse domains for its ability to provide distributed, decentralized and time-stamped transactions. It is attributed to by its fault-tolerant and zero- downtime characteristics with methods to ensure records of immutable data such that its modification is computationally infeasible. Trust frameworks and reputation models of an online interaction system are responsible for providing enough information (e.g., in the form of trust score) to infer the trustworthiness of interacting entities. The risk of failure or probability of success when interacting with an entity relies on the information provided by the reputation system. Thus, it is crucial to have an accurate, reliable and immutable trust score assigned by the reputation system. The centralized nature of current trust systems, however, leaves the valuable information as such prone to both external and internal attacks. This master's thesis project, therefore, studies the use of blockchain technology as an infrastructure for an online interaction system that can guarantee a reliable and immutable trust score. It proposes a system of smart contracts that specify the logic for interactions and models trust among pseudonymous identities of the system. The contract is deployed on a blockchain network where the trust score of entities are computed, stored and updated. The proposed method and the trust metrics used is evaluated by simulating an interaction graph using an existing dataset. The obtained results then illustrate that the proposed method is resilient against several threat models and distinguishes between honest or malicious participation of entities on the network.
APA, Harvard, Vancouver, ISO, and other styles
33

Odumodu, Maria Stella. "Collaborative Trust: A Case Study Of Trust Evolution in a Public/Nonprofit Partnership." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/157.

Full text
Abstract:
Lack of trust between nonprofit organizations and the communities in which they are located is a well-documented problem in the academic literature. The nature of this mistrust is far less understood, and little is known how community-nonprofit collaborations can overcome these gaps in trust. Guided by Simmel's theory of trust, this study examined the role of collaborative trust between public and non-profit organizations with a focus on better understanding how trust evolves. The research questions focused on how trust was defined and the factors that enhanced and inhibited trust evolution within the context of collaborations between nonprofit organizations and communities. Data were gathered through structured, in-depth interviews with 14 staff and stakeholders, a focus group of 4 management committee members, and the examination of partnership documents.Data from the interviews and documents were inductively coded and then organized around key themes. The themes from the content analysis indicated that the 3 chief executive officers in the partnership embraced the concept of collaboration, invested time at trust building activities, and obtained stakeholder support. This study contributes to positive social change by providing information for policy makers and administrators of public and nonprofit organizations facing similar contexts about how the development of trust can remove the barriers and sustain collaboration to deliver social program services efficiently and equitably.
APA, Harvard, Vancouver, ISO, and other styles
34

Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.

Full text
Abstract:
L'internet des Objets (IoT) est un paradigme qui a rendu les objets du quotidien, intelligents en leur offrant la possibilité de se connecter à Internet, de communiquer et d'interagir. L'intégration de la composante sociale dans l'IoT a donné naissance à l'Internet des Objets Social (SIoT), qui a permis de surmonter diverse problématiques telles que l'interopérabilité et la découverte de ressources. Dans ce type d'environnement, les participants rivalisent afin d'offrir une variété de services attrayants. Certains d'entre eux ont recours à des comportements malveillants afin de propager des services de mauvaise qualité. Ils lancent des attaques, dites de confiance, et brisent les fonctionnalités de base du système. Plusieurs travaux de la littérature ont abordé ce problème et ont proposé différents modèles de confiance. La majorité d'entre eux ont tenté de réappliquer des modèles de confiance conçus pour les réseaux sociaux ou les réseaux pair-à-pair. Malgré les similitudes entre ces types de réseaux, les réseaux SIoT présentent des particularités spécifiques. Dans les SIoT, nous avons différents types d'entités qui collaborent, à savoir des humains, des dispositifs et des services. Les dispositifs peuvent présenter des capacités de calcul et de stockage très limitées et leur nombre peut atteindre des millions. Le réseau qui en résulte est complexe et très dynamique et les répercussions des attaques de confiance peuvent être plus importantes. Nous proposons un nouveau modèle de confiance, multidimensionnel, dynamique et scalable, spécifiquement conçu pour les environnements SIoT. Nous proposons, en premier lieu, des facteurs permettant de décrire le comportement des trois types de nœuds impliqués dans les réseaux SIoT et de quantifier le degré de confiance selon les trois dimensions de confiance résultantes. Nous proposons, ensuite, une méthode d'agrégation basée sur l'apprentissage automatique et l'apprentissage profond qui permet d'une part d'agréger les facteurs proposés pour obtenir un score de confiance permettant de classer les nœuds, mais aussi de détecter les types d'attaques de confiance et de les contrer. Nous proposons, ensuite, une méthode de propagation hybride qui permet de diffuser les valeurs de confiance dans le réseau, tout en remédiant aux inconvénients des méthodes centralisée et distribuée. Cette méthode permet d'une part d'assurer la scalabilité et le dynamisme et d'autre part, de minimiser la consommation des ressources. Les expérimentations appliquées sur des de données synthétiques nous ont permis de valider le modèle proposé
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
APA, Harvard, Vancouver, ISO, and other styles
35

Severinsen, Jeremy John. "Measuring Trust for Crowdsourced Geographic Information." Thesis, University of Canterbury. Geography, 2015. http://hdl.handle.net/10092/10472.

Full text
Abstract:
In recent years Crowdsourced, or Volunteered, Geographic Information (CGI, VGI), has emerged as a large, up-to-date and easily accessible data source. Primarily attributable to the rise of the Geoweb and widespread use of location enabled technologies, this environment of widespread innovation has repositioned the role of consumers of spatial information. Collaborative and participatory web environments have led to a democratisation of the global mapping process, and resulted in a paradigm shift to the consumer of geographic data also acting as a data producer. With such a large and diverse group of participants actively mapping the globe, the resulting flood of information has become increasingly attractive to authoritative mapping agencies, in order to augment their own spatial data supply chains. The use of CGI would allow these agencies to undertake continuous improvement of their own data and products, adding a dimension of currency that has previously been unattainable due to high associated costs. CGI, however, through its diversity of authorship, presents a quality assurance risk to these agencies should it be included in their authoritative products. Until now, this risk has been insurmountable, with CGI remaining a “Pandora’s Box” which many agencies are reluctant to open. This research presents an algorithmic model that overcomes these issues, by quantifying trust in CGI in order to assess its implied quality. Labeled “VGTrust”, this model assesses information about a data author, its spatial trust, as well as its temporal trust, in order to produce an overall metric that is easy to understand and interpret. The VGTrust model will allow mapping agencies to harness CGI to augment existing datasets, or create new ones, thereby facilitating a targeted quality assurance process and minimizing risk to authoritativeness. This research proposes VGTrust in theory, on the basis of existing examinations of trust issues with CGI. Furthermore, a facilitated case study, “Building Our Footprints” is presented, where VGTrust is deployed to facilitate the capture of a building footprint dataset, the results of which revealing the veracity of the model as a measure to assess trust for these data. Finally, a data structure is proposed in the form of a “geo-molecule”, which allows the full spectrum of trust indicators to be stored a data structure at feature level, allowing the transitivity of this information to travel with each feature following creation. By overcoming the trust issues inherent in CGI, this research will allow the integration of crowdsourced and authoritative data, thereby leveraging the power of the crowd for productive and innovative re-use.
APA, Harvard, Vancouver, ISO, and other styles
36

Walker, David Lennox. "Towards a Model of Large Network Cooperation." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/25784.

Full text
Abstract:
An insurgency is a clandestine movement seeking to overthrow a government using a combination of violence, intimidation, and peaceful means. Defeating an insurgency requires re-shaping the civilian social networks within which the insurgency is operating. Over the last 70 years, attempts by militaries and other government agencies to do this have often been counterproductive, destroying trust and generated conflict. Infrastructure projects have been used to provide a context for network development and shaping activities, but they carry a high risk of corruption and fraud. This research develops a model of large network cooperation (LNC) that partially explains why some contemporary counterinsurgency tactics and strategies fail. It is proposed large network cooperation emerges when a Central Organisation offers a Membership Contract that is a simple, valuable, and offered indiscriminately to all Potential Members. Additionally, the Central Organisation should have strong ties to its potential competitors and implementation of Membership Contracts should be facilitated by Decentralised Decision Makers, who should not negotiate or change the contract. The architecture and membership of the network should evolve through many short iterations and the network must be subject to constant testing. The model is validated using qualitative case study research. Evidence suggests that the Provincial Reconstruction Teams – the primary tactical units employed by the International Security Assistance Force in Afghanistan – have been relatively unsuccessful because several of the program’s fundamental assumptions undermine LNC. Conversely, evidence suggests that the National Solidarity Program – a government infrastructure program in Afghanistan – is relatively successful because it more closely resembles the proposed model. The research contributes to the fields of Defence and National Security, Social Network Analysis, Economics, and Organisational Science.
APA, Harvard, Vancouver, ISO, and other styles
37

Maiden, Wendy Marie. "Dualtrust a trust management model for swarm-based autonomic computing systems /." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Thesis/Spring2010/W_Maiden_6041310.pdf.

Full text
Abstract:
Thesis (M.A. in electrical engineering and computer science)--Washington State University, May 2010.
Title from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
APA, Harvard, Vancouver, ISO, and other styles
38

Acosta, Antognoni Hedy. "Trust your company: A multimethod approach based on the Hero model." Doctoral thesis, Universitat Jaume I, 2017. http://hdl.handle.net/10803/404719.

Full text
Abstract:
The current thesis aims the mediating role of organizational trust based on The HERO Model (Salanova, Llorens, Cifre, & Martínez, 2012) through a multimethod approach. Seven empirical studies confirm the mediating role of organizational trust as an underlying mechanism which mediates the relationship between resources and practices implemented by them and its organizational outcomes. These studies (one qualitative and six quantitative cross-sectional y longitudinal) have been performed using different samples and sources of information, as well as SEM, HLM, and longitudinal analyses. The thesis contributes to a deep understanding of the antecedents and consequences related to the dimensions of organizational trust. This information is an important resource relevant to CEO's in order to make decisions to develop trust in their organizations as an important competitive advantage in modern organizations to be a HERO.
Esta tesis tuvo el objetivo de evaluar el rol de la confianza organizacional basándonos en el Modelo HERO (Salanova, Llorens, Cifre, & Martínez, 2012) a través de una aproximación multimetodo. Siete estudios empíricos confirman el rol mediador de la confianza organizacional, como mecanismo subyacente, entre los recursos y prácticas implementadas y los resultados organizacionales. Estos estudios (uno cualitativos y seis cuantitativos cross-sectional y longitudinal) se han realizado usando diferentes muestras y fuentes de información, así como análisis SEM, HLM y longitudinal. La tesis contribuye a entender en profundidad cuáles son los antecedentes y consecuencias relacionas a las dimensiones de la confianza organizacional. Esta información es un importante recurso para los Gerentes o Gestores de Recursos Humanos para tomar decisiones y desarrollar confianza en sus organizaciones debido a que es una ventaja competitiva en las organizaciones actuales que quieren ser HEROs
APA, Harvard, Vancouver, ISO, and other styles
39

Švec, Tomáš. "Multiple-Context Trust Model for a Social Network Using Personality Analysis." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412910.

Full text
Abstract:
Tato diplomová práce navazuje na bakalářskou práci, ve které byl vytvořen model důvěry pro sociální síť Facebook. Do tohoto modelu jsou zapracovány připomínky z konference UMAP 2013 a ověřena jeho škálovatelnost a flexibilita. V další části práce jsou uvedeny základní termíny z psychologie osobnosti a zkoumána závislost důvěry na osobnosti uživatele. Je vybrán model Big Five k reprezentaci charakteru uživatele a navržen dotazník, u nějž bude zkoumána korelace s modelem důvěry. Tato korelace je na základě sociologických poznatků odhadnuta a později ověřena na reálných uživatelích sociální sítě Facebook.
APA, Harvard, Vancouver, ISO, and other styles
40

Maw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further decline in the patient's condition or can even lead to death. Therefore, the availability of data is more important than security concerns. The overwhelming priority is to take care of the patient, but the privacy and confidentiality of that patient's medical records cannot be neglected. In current healthcare applications, there are many problems concerning security policy violations such as unauthorised denial of use, unauthorised information modification and unauthorised information release of medical data in the real world environment. Current WSN access control models used the traditional Role-Based Access Control (RBAC) or cryptographic methods for data access control but the systems still need to predefine attributes, roles and policies before deployment. It is, however, difficult to determine in advance all the possible needs for access in real world applications because there may be unanticipated situations at any time. This research proceeds to study possible approaches to address the above issues and to develop a new access control model to fill the gaps in work done by the WSN research community. Firstly, the adaptive access control model is proposed and developed based on the concept of discretionary overriding to address the data availability issue. In the healthcare industry, there are many problems concerning unauthorised information release. So, we extended the adaptive access control model with a prevention and detection mechanism to detect security policy violations, and added the concept of obligation to take a course of action when a restricted access is granted or denied. However, this approach does not consider privacy of patients' information because data availability is prioritised. To address the conflict between data availability and data privacy, this research proposed the Trust-based Adaptive Access Control (TBA2C) model that integrates the concept of trust into the previous model. A simple user behaviour trust model is developed to calculate the behaviour trust value which measures the trustworthiness of the users and that is used as one of the defined thresholds to override access policy for data availability purpose, but the framework of the TBA2C model can be adapted with other trust models in the research community. The trust model can also protect data privacy because only a user who satisfies the relevant trust threshold can get restricted access in emergency and unanticipated situations. Moreover, the introduction of trust values in the enforcement of authorisation decisions can detect abnormal data access even from authorised users. Ponder2 is used to develop the TBA2C model gradually, starting from a simple access control model to the full TBA2C. In Ponder2, a Self-Managed Cell (SMC) simulates a sensor node with the TBA2C engine inside it. Additionally, to enable a full comparison with the proposed TBA2C model, the Break-The-Glass Role Based Access Control (BTGRBAC) model is redesigned and developed in the same platform (Ponder2). The proposed TBA2C model is the first to realise a flexible access control engine and to address the conflict between data availability and data privacy by combining the concepts of discretionary overriding, the user behaviour trust model, and the prevention and detection mechanism.
APA, Harvard, Vancouver, ISO, and other styles
41

Balkind, Nicole Robertson Graeme. "A model republic? trust and authoritarianism on Tatarstan's road to autonomy /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2492.

Full text
Abstract:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2009.
Title from electronic title page (viewed Oct. 5, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Curriculum of Russian and East European Studies." Discipline: Russian and East European Studies; Department/School: Russian and East European Studies.
APA, Harvard, Vancouver, ISO, and other styles
42

Alsaif, Talal M. "Trust transference from brick to click retailers : a model of perceived structural assurance in the introductory stage of customers' interaction." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/13603.

Full text
Abstract:
Previous studies have revealed that the creation of synergy among retailers’ channels can enhance customers’ satisfaction and loyalty. Nevertheless, little is known about utilising such synergy in inducing customers’ purchasing behaviour in electronic commerce. In an attempt to address this issue, few empirical studies have been conducted into the role of trust transference from brick to click channels in order to understand customers’ purchasing intentions. These empirical studies have mainly focused on interpersonal trust as a proxy of the transference process. Therefore, the present study seeks to articulate the importance of impersonal trust, and shed light on its expected role in the transference process during the introductory stage of customers’ interaction. Impersonal trust, or perceived structural assurance as labelled in this study, refers to customers’ beliefs in the legal and technological structures of retailers’ websites. However, the introductory stage describes the state of customers when they have not yet been exposed to a retailer’s website. These notions are thoroughly reviewed and synthesised to achieve a proper conceptualisation and operationalisation for the perceived structural assurance. Then, on the basis of previous theories and studies, a conceptual model is constructed to determine several drivers of the perceived structural assurance, as well as its consequences. With regard to the research methodology, a quantitative triangulation choice is adopted in the present study. This choice involves the design of a survey questionnaire, which is employed after relying on several explorative instruments. However, upon the insights of a pilot study, a total of 304 responses are used to analyse the overall research data. Then, the results are generated through an advanced stage of statistical analysis which is performed by Structural Equation Modelling (SEM). The results indicate that the validated model is robust and can be used in generalising the findings of the current research. The novelty of this study involves several contributions to the body of knowledge and practice. This study develops a model that theoretically extends the existing knowledge on the trust transference phenomenon and posits an effective approach of triangulating methods in quantitative research. Lastly, this study contributes to the practice by presenting evidence to support the synergy among retailers’ brick and click channels.
APA, Harvard, Vancouver, ISO, and other styles
43

Khazanchi, Shalini. "A "Social Exchange" Model of Creativity." Cincinnati, Ohio : University of Cincinnati, 2005. http://www.ohiolink.edu/etd/view.cgi?acc%5Fnum=ucin1115336085.

Full text
Abstract:
Thesis (Ph. D.)--University of Cincinnati, 2005.
Title from electronic thesis title page (viewed Apr. 11, 2006). Includes abstract. Keywords: Creativity; Social Exchange; Fairness; Trust. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
44

Kouri, Drew P. "A Nonlinear Response Model for Single Nucleotide Polymorphism Detection Assays." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1212598582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hirst, Tracey Michelle. "A Stability Contingent Model of Interpersonal Trust in a Local Government Context." Thesis, Curtin University, 2018. http://hdl.handle.net/20.500.11937/73566.

Full text
Abstract:
A tentative Stability Contingent Model of Trust is presented as a result of exploratory, qualitative research into an unexplored area of interpersonal trust in a Local Government context. Findings supported the literature that benevolence and competence are central to trust assessments. An original contribution found stability and locus of causality were also salient. Unusually, both white-collar and blue-collar employees were included and contrasted. Issues for a future research agenda are presented.
APA, Harvard, Vancouver, ISO, and other styles
46

Martinsson, Håkan. "An evaluation of subjective logic for trust modelling in information fusion." Thesis, University of Skövde, School of Humanities and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-977.

Full text
Abstract:

Information fusion is to combine information from a variety of sources, or sensors. When the sources are uncertain or contradicting conflict can arise. To deal with such uncertainty and conflict a trust model can be used. The most common ones in information fusion currently is bayesian theory and Dempster-Shafer theory. Bayesian theory does not explicitly handle ignorance, and thus predetermined values has to be hard coded into the system. This is solved in Dempster-Shafer theory by the introduction of ignorance. Even though Dempster-Shafer theory is widely used in information fusion when there is a need for ignorance to be modelled, there has been serious critique presented towards the theory. Thus this work aims at examining another trust models utility in information fusion namely subjective logic. The examination is executed by studying subjective logic using two scenarios from the literature. The results from the scenarios points to subjective logic being a reasonable approach for modelling trust in information fusion.

APA, Harvard, Vancouver, ISO, and other styles
47

Coshott, Derwent Ralph. "The Legal and Economic Development of the Express Trust: Advancing A Conceptual Model for the Development and Reform of the Express Trust." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/18057.

Full text
Abstract:
This thesis advances a unified concept of the express trust—both private and charitable—that emerges from an examination of its mandatory law, and informed by the oft-cited purpose of the trust structure: to benefit another. This concept, or theory of the express trust, is of a framework of legal rules whose purpose is to confer enforceable benefits on people, and that what is beneficial is determined by reference to the broader social context (which includes the economic and commercial environment) in which an express trust operates. The reason for advancing such a concept of the express trust, and the problem it addresses as a result, is that in the modern social and economic context, private and charitable trusts have come to be utilised in new and novel ways which challenge traditional understandings of their functions, limits and purposes; threatening to render the term “express trust” as simply a label applied to certain legal structures with no discernable common rationale. Yet if a consensual legal structure, such as the express trust, is to remain socially relevant, it must also adapt and develop with the times, else risk falling into disuse and irrelevancy. Accordingly, the strain between these two countervailing forces represents an on going challenge in seeking to develop and reform the laws of the express trust, which a theoretical concept of the express trust is well positioned to address. To that end, this thesis develops a conceptual framework for understanding the express trust with positive and normative force that is capable of addressing the challenges facing the express trust in the modern context. This is demonstrated by its application to four issues facing the modern express trust: settlor/third-party enforcement; the abolition of the rule against perpetuities and the rule in Saunders v Vautier; the nature of the trustee’s rights of indemnity; and the Non-Charitable Purpose (“NCP”) trust. This exercise shows how these, and other, challenges can be mediated into the laws of the express trust through the conceptual framework advanced in this thesis, so as to ensure the express trust remains socially reflective, while simultaneously remaining functionally cohesive as a legal structure for the benefit of another.
APA, Harvard, Vancouver, ISO, and other styles
48

Liou, Lin-shu, and 劉麟書. "An Integrative Model of Interpersonal Trust." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/69409129384343745643.

Full text
Abstract:
碩士
銘傳大學
管理科學研究所
89
Through literature reviewing, an integrative model of interpersonal trust is proposed. This theoretical model includes four parts: the characteristics, the forms, the antecedents, and the outcomes of interpersonal trust. First, the characteristics of interpersonal trust are interdependence, psychological construct, risk, goodwill, rational dimension, and affective dimension. Next, three forms of interpersonal trust are identified, which are cognition-based, affect-based, and institution-based trust. The antecedents that influence these three forms of trust are “benefits, competence, integrity, and social similarity,” “benevolence and mutual sentiment,” and “laws and regulation, formal institutions, shared understanding, and informal institutions,” accordingly. Then, the outcomes of interpersonal trust are divided into social and economic outcomes, and the economic outcomes will be actualized only through the social outcomes. Finally, 14 propositions based on the integrative model of interpersonal trust and implications for future research are presented.
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Peng-Yu, and 陳鵬宇. "Trust Model for Cognitive Radio Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/77639508118417968298.

Full text
Abstract:
碩士
國立臺灣大學
電信工程學研究所
97
Devices with cognitive radio capabilities of spectrum sensing to fully utilize radio spectrum have been considered as a key technology in future wireless communications. Primary system and CRs, which can leverage and coexist with legacy systems, thus form cognitive radio networks (CRN) which originally design to improve the spectrum utilization. When we try to further consider network efficiency, the problem turns into optimization in a inter-network manner. In cognitive radio networking function, CRs should establish trust association with neighbors for construction of trusted route. This is an important initial step in network layer design of CRN since the cooperative routing transmission is allowable in the heterogeneous systems. In this thesis, we propose a general trust decision criterion for nodes as receiving association request from neighbors. We exploit unique ID to identify nodes and derive the decision criterion under system-defined constraint. It minimizes the risk of accepting probable malicious users. On the other hand, each node in CRN should observe, analyze, and learn the trust evidence such like packet loss rate, total time delay, and etc. The trust model in this thesis provides a methodology to measure the trust evidence and try to learn and response to the analyzed data meanwhile. It should be not only suitable for dynamic topology variation in CRN but also learn the behavior change in individual node. Then, we can build up the first step when we try to design the network architecture of CRN. When we learn the some special parameters from the trust model, we expect to move forward from trust association to trusted routing in CRN.
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Shiang-Ru, and 李湘茹. "A trust-model based on standardized feedback." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/7ah234.

Full text
Abstract:
碩士
國立臺北科技大學
資訊與運籌管理研究所
101
With the blossom of peer-to-peer (P2P) applications, more and more people share resources through online community or forum. However, there is a major problem in the P2P environment - all nodes share resources using the same anonymous identity. There are potential risks when a user of a node decides to download files from the other nodes. Many solutions were based on a previous proposed trust-model which takes feedback and calculates trust values of nodes directly. However, it may have some calculation errors since behavior of evaluation differs from person to person. In this paper, we elaborate on a newly designed “a trust-model based on standardized feedback” (stdF model). It can calculate trust values of a node with standardized feedback factor, historical factor, risk factor, and incentive factor. After that, it will make a decision if a node is going to download files from another node or not. Moreover, performance of the proposed method is evaluated by simulation. Compared to MFTM model, results of simulations indicate that stdF model is much better.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography