Статті в журналах з теми "Trust in expert systems"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Trust in expert systems.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trust in expert systems".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Wallace, Louise M., Peter Spurgeon, Jonathan Benn, Maria Koutantji, and Charles Vincent. "Improving patient safety incident reporting systems by focusing upon feedback – lessons from English and Welsh trusts." Health Services Management Research 22, no. 3 (August 2009): 129–35. http://dx.doi.org/10.1258/hsmr.2008.008019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper describes practical implications and learning from a multi-method study of feedback from patient safety incident reporting systems. The study was performed using the Safety Action and Information Feedback from Incident Reporting model, a model of the requirements of the feedback element of a patient safety incident reporting and learning system, derived from a scoping review of research and expert advice from world leaders in safety in high-risk industries. We present the key findings of the studies conducted in the National Health Services (NHS) trusts in England and Wales in 2006. These were a survey completed by risk managers for 351 trusts in England and Wales, three case studies including interviews with staff concerning an example of good practice feedback and an audit of 90 trusts clinical risk staff newsletters. We draw on an Expert Workshop that included 71 experts from the NHS, from regulatory bodies in health care, Royal Colleges, Health and Safety Executive and safety agencies in health care and high-risk industries (commercial aviation, rail and maritime industries). We draw recommendations of enduring relevance to the UK NHS that can be used by trust staff to improve their systems. The recommendations will be of relevance in general terms to health services worldwide.
2

Sridharan. "TRUST BASED AUTOMATIC QUERY FORMULATION SEARCH ON EXPERT AND KNOWLEDGE USERS SYSTEMS." Journal of Computer Science 10, no. 7 (July 1, 2014): 1174–85. http://dx.doi.org/10.3844/jcssp.2014.1174.1185.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ameseder, Christoph, Oliver Meixner, Rainer Haas, Melanie Fritz, and Gerhard Schiefer. "Measurement of the importance of trust elements in agrifood chains: an application of the analytic hierarchy process." Journal on Chain and Network Science 8, no. 2 (January 1, 2008): 153–60. http://dx.doi.org/10.3920/jcns2008.x097.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper focuses on the level of inter-organizational trust-building elements in food chains of different countries. It is based on a theoretical typology of trust elements, developed and tested for an early stage of business to business (B2B) relationships. In a planned study, required data will be collected via qualitative expert interviews. The importance of trust elements will be measured by applying the analytic hierarchy process (AHP). The study will contribute to understanding the influence of cultural background and single key informants on inter-organizational trust. Results will be useful for the implementation of trust elements in B2B e-business applications.
4

Tonkin, Emma, Annabelle M. Wilson, John Coveney, Trevor Webb, and Samantha B. Meyer. "Trust in and through labelling – a systematic review and critique." British Food Journal 117, no. 1 (January 5, 2015): 318–38. http://dx.doi.org/10.1108/bfj-07-2014-0244.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – Distrust of conventional food supply systems impacts consumer food choice. This in turn has implications for consumer nutrition outcomes and acceptance of expert advice regarding food and health. The research exploring consumer trust is found across a broad range of research streams, and is not cohesive in topic or approach. The purpose of this paper is to synthesise the disparate literature exploring the interaction between food labelling and consumer trust to determine what is known, and gaps in knowledge regarding food labelling and consumer trust. Design/methodology/approach – A systematic search of trust and food labelling literature was conducted, with study results synthesised and integrated. Studies were then critically analysed for the conceptualisation of the consumer, the label, and their interaction with a framework developed using social theories of trust. Findings – In total, 27 studies were identified. It was found that not only is the current literature predominantly atheoretical, but the conceptualisation of labelling has been limited. Research limitations/implications – Further empirical research is needed to enable a more comprehensive understanding of the role food labelling plays in influencing consumer trust in food systems. Originality/value – This research develops a conceptualisation of the dual roles food labelling may play in influencing consumer trust in food systems. It distinguishes between trust in food labelling itself, and the trust consumers develop in the food supply system through food labelling. The novel theoretical model and synthesis provide a foundation upon which future research may be conducted.
5

Mahbooba, Basim, Radhya Sahal, Wael Alosaimi, and Martin Serrano. "Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models." Complexity 2021 (March 8, 2021): 1–23. http://dx.doi.org/10.1155/2021/5538896.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree (DT), K nearest neighbour (KNN), random forest (RF), and naïve Bayes (NB). The four deep learning techniques are LSTM (one and two layers) and GRU (one and two layers). Two datasets are used to classify the IDS attack type, including wireless sensor network detection system (WSN-DS) and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. Considering the findings related to the data, methodology, and expert accountability, interpretability for AI-based solutions also becomes demanded to enhance trust in the IDS.
6

Randell, Brian. "A Computer Scientist's Reactions to NPfIT." Journal of Information Technology 22, no. 3 (September 2007): 222–34. http://dx.doi.org/10.1057/palgrave.jit.2000106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper contains a set of personal views relating to NHS Connecting for Health's National Programme for IT (NPfIT), and in particular its Care Records Service, written from the point of view of a computer scientist, not a medical informatics expert. The principal points made are as follows: Centralisation: Pulling lots of data together (for individual patients and then for large patient populations) harms safety and privacy – it is one byproduct of excessive use of identification when in fact all that is usually needed is authentication. Large centralized data storage facilities can be useful for reliability, but risk exchanging lots of small failures for a lesser number of much larger failures. A much more decentralised approach to electronic patient record (EPR) data and its storage should be investigated. Evolutionary acquisition: Specifying, implementing, deploying and evaluating a sequence of ever more complete IT systems is the best way of ending up with well-accepted and well-trusted systems – especially when this process is controlled by the stakeholders who are most directly involved, rather than by some distant central bureaucracy. Thus authority as well as responsibility should be left with hospital and general practitioner trusts to acquire IT systems that suit their environments and priorities – subject to adherence to minimal interoperability constraints – and to use centralized services (e.g., for system support and back-up) as if and when they choose. Socio-technical issues: Ill-chosen imposed medical IT systems impede patient care, are resisted, result in lots of accidental faults, and lose user support and trust. All these points are attested to by rigorous studies involving expertise from the social sciences (psychology, ethnography, etc.) as well as by technical (medical and computer) experts – much more attention needs to be paid to such studies, and more such studies encouraged. Constructive reviews: A constructive expert review, working closely with Connecting for Health, could be very helpful, but should be evidently independent and open and thus essentially different in nature to past and current inquiries. A review of this nature could not just recommend appropriate changes of plan, and speed progress. It could also contribute to the vital task of helping to restore the trust and confidence of the public and the media in the programme and in the government officials involved.
7

TRČEK, DENIS. "QUALITATIVE ASSESSMENT DYNAMICS — COMPLEMENTING TRUST METHODS FOR DECISION MAKING." International Journal of Information Technology & Decision Making 13, no. 01 (January 2014): 155–73. http://dx.doi.org/10.1142/s0219622014500072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Trust is not only one key ingredient of prosperous organizations and societies, but also an essential factor in decision-making processes. And when it comes to trust, the latest advances in computing sciences area are increasingly supporting the related processes by deployment of so-called trust management systems. These systems are slowly advancing from their early stages of evolution toward more sophisticated and already operationally deployable solutions. As there seems to be no "Swiss-army knife" like methodology for trust management, it is reasonable to assume that not only one, but a few of them will be deployed in the future, depending on their basic principles of functioning,purposes and contexts of use. Therefore there still exists a gap in this area with unaddressed issues where humans (or humans-like agents) would be in focus. Quality Assessment Dynamics, QAD, which is presented in this paper, is taking these issues into account. It is based on operands and operators that model human ways of reasoning as described in many natural languages. Further, it is a formal system and therefore enabled for deployment in computing environments. This way QAD complements existing trust management methods and provides additional means for decision making through deployment in simulations and in trust management engines, while being understandable to ordinary users without requiring sophisticated expert knowledge.
8

Dadzie, Kofi Q., Charlene A. Dadzie, and Alvin J. Williams. "Trust and duration of buyer-seller relationship in emerging markets." Journal of Business & Industrial Marketing 33, no. 1 (February 5, 2018): 134–44. http://dx.doi.org/10.1108/jbim-04-2017-0090.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose This study aims to examine how various components of interpersonal trust (affective and cognitive) influence the duration of buyer-seller relationships in the emerging market (EM) context of a heterogeneous market structure dominated by small, fragmented sellers/suppliers. Design/methodology/approach The study proposes a hazard model for analyzing duration effects of interpersonal trust in the EM context. The model was validated using data on buying agents provided by 340 cocoa sellers/producers in Ghana, gathered from extensive field interviews. Findings Results of the survival analysis reveal a limited but significant positive duration effect of cognitive (ability) trust only. Further analysis of sellers’ duration intentions (intention to remain with a buyer) also reveals a positive impact of affective trust but no impact of cognitive (ability and integrity) trust. Cocoa bean sellers’ evaluation of buying firms’ purchasing agents suggests that buying firms underperform on emotional/affective components of interpersonal trust, and that private firms outperform state buying agents on ability trust as well. Research limitations/implications While this study focused on the fragmented nature of sellers in the EM context, and the scope was limited to the sellers’ interpersonal trust perception of the buyer-seller, future research should examine both buyer and seller perceptions to obtain complete insight into the buyer-seller dyad in the EM context. In addition, the results of the duration effects identified in this study may not be generalizable to other EM export commodities, where channels have long been fully privatized. Ghana’s cocoa export marketing system was only recently privatized, and potentially has more sellers at the risk of adopting/switching relationships with their buyers than would be expected in more privatized expert commodity marketing systems. Practical implications Managers of export commodity buying firms in EMs can take advantage of the positive duration effects of cognitive trust by constantly improving the capabilities of their purchasing agents throughout the lifetime of their suppliers to sustain their relationship. However, sellers’ intention to switch can be mitigated by formalizing policies that encourage emotional bonds with sellers, especially small-scale producers in highly vulnerable bargaining positions. The aggregate output of small-scale producers could be of strategic importance in the future. Originality/value Managers need systematic empirical evidence of the nature of duration effects of interpersonal trust given anecdotal evidence suggesting that managers have a tendency to emphasize cognitive trust over affective/emotional trust. Further, the applicability of such evidence in the EM context is critical given unique conditions such as highly fragmented sellers dealing with relatively large corporations.
9

Savolainen, Reijo. "Manifestations of expert power in gatekeeping: a conceptual study." Journal of Documentation 76, no. 6 (April 11, 2020): 1215–32. http://dx.doi.org/10.1108/jd-01-2020-0010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
PurposeThis study aims to elaborate the picture of the relationships between information and power by examining how expert power appears in the characterizations of gatekeeping presented in the research literature.Design/methodology/approachThis study uses conceptual analysis for examining how expert power is constitutive of the construct of gatekeeper and how people subject to the influence of gatekeeping trust or challenge the expert power attributed to gatekeepers. The study draws on the analysis of 40 key studies on the above issues.FindingsResearchers have mainly constructed the gatekeepers' expert power in terms of superior knowledge and skills applicable to a specific domain, coupled with an ability to control or facilitate access to information. The gatekeeper's expert power has been approached as a contextual factor that facilitates rather than controls access to information. The power relationships between the gatekeepers and those subject to gatekeeping vary contextually, depending on the extent to which the latter have access to alternative sources of information. The findings highlight the need to elaborate the construct of gatekeeping by rethinking its relevance in the networked information environments where the traditional picture of gatekeepers controlling access to information sources is eroding.Research limitations/implicationsAs the study focuses on how expert power figures in gatekeeping, no attention is devoted to the role of social power of other types, for example, reward power and referent power.Originality/valueThe study pioneers by providing an in-depth analysis of the nature of expert power as a constituent of gatekeeping.
10

Cherepanova, Marya I., Svetlana G. Maximova, and Sydysmaa A. Saryglar. "SOCIAL CAPITAL OF THE ALTAI TERRITORY: HOW TRUST DETERMINES SECURITY." Society and Security Insights 3, no. 2 (June 21, 2020): 132–49. http://dx.doi.org/10.14258/ssi(2020)2-08.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The scientific significance of studying security problems in regional societies is determined by the need to reveal its actual components. Such complex indicator as social capital includes basic indicators of the functioning of civil society: social responsibility, activity, civic initiative, etc. The social capital formed in society induces generalized trust. At the same time, institutional trust contributes to the legitimization of legal and political institutions. The purpose of this article is to describe the social mechanism of interdependence of components of social capital and generalized trust that form a sense of security in the region. The article summarizes expert assessments that indicate heterogeneity of institutional systems, which are indicators of low coherence of the social order and form a low level of trust and, consequently, security in the Altai territory. It is concluded that for modern Russian society, as well as for its regions, the problem of regenerating generalized trust as a social background for optimizing post-industrial transformations is extremely significant. Stability of the active role of social institutions, the reproduction of spiritual values, such as the common good, inter-ethnic tolerance, social justice are among most important factors restoring social trust.
11

Bekamiri, Hamid, Seyedeh Fatemeh Ghasempour Ganji, Biagio Simonetti, and Seyed Amin Hosseini Seno. "A New Model to Identify the Reliability and Trust of Internet Banking Users Using Fuzzy Theory and Data-Mining." Mathematics 9, no. 9 (April 21, 2021): 916. http://dx.doi.org/10.3390/math9090916.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As a result of changes in approach from traditional to virtual banking system, security in data exchange has become more important; thus, it seems essentially necessary to present a pattern based on smart models in order to reduce fraud in this field. A new algorithm has been provided in this article to improve security and to specify the limits of giving special services to Internet banking users in order to pave appropriate ground for virtual banking. In addition to identifying behavioral models of customers, this algorithm compares the behaviors of any customer with this model and finally computes the rate of trust in customer’s behavior. The hybrid data-mining and knowledge based structure has been adapted in this algorithm according to fuzzy systems. In this research, qualitative data was gathered from interviews with banking experts, analyzed by Expert Choice to identify the most important variables of customer behavior analysis, and to analyze customer behavior and customer bank Internet transaction data for a period of one year by MATLAB and Clementine. The results of this survey indicate that the potential of the given structure to recognize the rate of trust in Internet bank user’s behavior might be at reasonable level for experts in this area.
12

Yakel, Elizabeth, Ixchel M. Faniel, Adam Kriesberg, and Ayoung Yoon. "Trust in Digital Repositories." International Journal of Digital Curation 8, no. 1 (June 14, 2013): 143–56. http://dx.doi.org/10.2218/ijdc.v8i1.251.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC), outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.
13

Wu, Hangyao, Peijia Ren, and Zeshui Xu. "Hesitant Fuzzy Linguistic Consensus Model Based on Trust-Recommendation Mechanism for Hospital Expert Consultation." IEEE Transactions on Fuzzy Systems 27, no. 11 (November 2019): 2227–41. http://dx.doi.org/10.1109/tfuzz.2019.2896836.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Yan, You, Zhao Dongmei, and Yang Weining. "Role of Platform, Supplier and Medium in Online Trust Formation." International Journal of Business Data Communications and Networking 15, no. 1 (January 2019): 58–70. http://dx.doi.org/10.4018/ijbdcn.2019010104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Research literature suggests that online trust and commitment are the core constructs in building a sustainable electronic commerce relationship. This article investigates the respective roles of the platform, supplier and medium in forming online trust, and determines whether these factors ultimately influence purchase intentions. It seeks to re-examine the trust model by McKnight and identifies how a trust model can be adapted in current business environments. A model is developed and tested by six constructs which have an impact on each other. Survey data from online platform customers (n = 386) are used to test the online trust hypotheses with structural equation modeling. As hypothesized, the results suggest that platform, supplier and medium have a positive relationship with online trust, and especially the platform has the highest positive impact. Among platform sub constructs, the web design, supplier rank and the privacy policy are crucial. After sale service, the company location and price strongly influence the supplier. For the medium sub constructs, 3rd party seals impact the medium more strongly than expert comments and consumer reviews. However, the medium has negative impact on behavioral intentions. The article identifies interesting differences between the original work by McKnight and the findings of this study, but basically concludes that the online trust theory applies to current electronic commerce market. Few studies have examined the role of platform, supplier and medium separately in forming online trust. This study divides platform and supplier into two separate constructs to meet the new market development. The modified model truly reflects the vibrant online platform environment and can provide better insight into managing the platform.
15

Hazratzadeh, Saeedeh, and Nima Jafari Navimipour. "Colleague recommender system in the Expert Cloud using features matrix." Kybernetes 45, no. 9 (October 3, 2016): 1342–57. http://dx.doi.org/10.1108/k-08-2015-0221.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Expert Cloud as a new class of cloud systems enables its users to request and share the skill, knowledge and expertise of people by employing internet infrastructures and cloud concepts. Since offering the most appropriate expertise to the customer is one of the clear objectives in Expert Cloud, colleague recommendation is a necessary part of it. So, the purpose of this paper is to develop a colleague recommender system for the Expert Cloud using features matrices of colleagues. Design/methodology/approach The new method is described in two phases. In the first phase, all possible colleagues of the user are found through the filtering mechanism and next features of the user and possible colleagues are calculated and collected in matrices. Six potential features of colleagues including reputation, expertise, trust, agility, cost and field of study were proposed. In the second phase, the final score is calculated for every possible colleague and then top-k colleagues are extracted among users. The survey was conducted using a simulation in MATLAB Software. Data were collected from Expert Cloud website. The method was tested using evaluating metrics such as precision, accuracy, incorrect recommendation and runtime. Findings The results of this study indicate that considering more features of colleagues has a positive impact on increasing the precision and accuracy of recommending new colleagues. Also, the proposed method has a better result in reducing incorrect recommendation. Originality/value In this paper, the colleague recommendation issue in the Expert Cloud is pointed out and the solution approach is applied into the Expert Cloud website.
16

Woodall, Angela, and Sharon Ringel. "Blockchain archival discourse: Trust and the imaginaries of digital preservation." New Media & Society 22, no. 12 (November 22, 2019): 2200–2217. http://dx.doi.org/10.1177/1461444819888756.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
From its origins in virtual financial transactions, emerging initiatives are seeking to acquire a new identity for blockchain as capable of addressing anxieties over the capacity of digital media to permanently and accurately store information. In this article, we explore the ensuing mediation between blockchain enterprises and new professional communities to which they are catering. Drawing on thematic analysis, we analyze how this process is being carried out through the discursive construction of trust, leveraged rhetorically in academic, trade, and news publications to extend an application for financial transactions to cultural institutions. We describe how trust is used not only to mediate the introduction of an application that prioritizes decentralization and cryptography, but is the turf on which traditional institutions are staking a claim as the trustworthy managers of digital records through their use of blockchain. The concept of the archival imaginary—a vision of what archives and blockchain should be and mean that pivots on imagined needs and technological capacities based on the current information ecology, institutional control, and expert systems—offers a way to illuminate this process.
17

Ashouraie, Mehran, and Nima Jafari Navimipour. "Priority-based task scheduling on heterogeneous resources in the Expert Cloud." Kybernetes 44, no. 10 (November 2, 2015): 1455–71. http://dx.doi.org/10.1108/k-12-2014-0293.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – Expert Cloud as a new class of Cloud systems provides the knowledge and skills of human resources (HRs) as a service using Cloud concepts. Task scheduling in the Expert Cloud is a vital part that assigns tasks to suitable resources for execution. The purpose of this paper is to propose a method based on genetic algorithm to consider the priority of arriving tasks and the heterogeneity of HRs. Also, to simulate a real world situation, the authors consider the human-based features of resources like trust, reputation and etc. Design/methodology/approach – As it is NP-Complete to schedule tasks to obtain the minimum makespan and the success of genetic algorithm in optimization and NP-Complete problems, the authors used a genetic algorithm to schedule the tasks on HRs in the Expert Cloud. In this method, chromosome or candidate solutions are represented by a vector; fitness function is calculated based on several factors; one point cross-over and swap mutation are also used. Findings – The obtained results demonstrated the efficiency of the proposed algorithm in terms of time complexity, task fail rate and HRs utilization. Originality/value – In this paper the task scheduling issue in the Expert Cloud and improving pervious algorithm are pointed out and the approach to resolve the problem is applied into a practical example.
18

Billiet, Lieven, Sabine Van Huffel, and Vanya Van Belle. "Interval Coded Scoring: a toolbox for interpretable scoring systems." PeerJ Computer Science 4 (April 2, 2018): e150. http://dx.doi.org/10.7717/peerj-cs.150.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over the last decades, clinical decision support systems have been gaining importance. They help clinicians to make effective use of the overload of available information to obtain correct diagnoses and appropriate treatments. However, their power often comes at the cost of a black box model which cannot be interpreted easily. This interpretability is of paramount importance in a medical setting with regard to trust and (legal) responsibility. In contrast, existing medical scoring systems are easy to understand and use, but they are often a simplified rule-of-thumb summary of previous medical experience rather than a well-founded system based on available data. Interval Coded Scoring (ICS) connects these two approaches, exploiting the power of sparse optimization to derive scoring systems from training data. The presented toolbox interface makes this theory easily applicable to both small and large datasets. It contains two possible problem formulations based on linear programming or elastic net. Both allow to construct a model for a binary classification problem and establish risk profiles that can be used for future diagnosis. All of this requires only a few lines of code. ICS differs from standard machine learning through its model consisting of interpretable main effects and interactions. Furthermore, insertion of expert knowledge is possible because the training can be semi-automatic. This allows end users to make a trade-off between complexity and performance based on cross-validation results and expert knowledge. Additionally, the toolbox offers an accessible way to assess classification performance via accuracy and the ROC curve, whereas the calibration of the risk profile can be evaluated via a calibration curve. Finally, the colour-coded model visualization has particular appeal if one wants to apply ICS manually on new observations, as well as for validation by experts in the specific application domains. The validity and applicability of the toolbox is demonstrated by comparing it to standard Machine Learning approaches such as Naive Bayes and Support Vector Machines for several real-life datasets. These case studies on medical problems show its applicability as a decision support system. ICS performs similarly in terms of classification and calibration. Its slightly lower performance is countered by its model simplicity which makes it the method of choice if interpretability is a key issue.
19

Kaaya, Elsie Somi, Jesuk Ko, and Edith Luhanga. "Maternal knowledge-seeking behavior among pregnant women in Tanzania." Women's Health 17 (January 2021): 174550652110384. http://dx.doi.org/10.1177/17455065211038442.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background: Maternal mortality continues to be a global challenge with about 830 women dying of childbirth and pregnancy complications every day. Tanzania has a maternal mortality rate of 524 deaths per 100,000 live births. Objective: Knowing symptoms associated with antenatal risks among pregnant women may result in seeking care earlier or self-advocating for more immediate treatment in health facilities. This article sought to identify knowledge-seeking behaviors of pregnant women in Northern Tanzania, to determine the challenges met and how these should be addressed to enhance knowledge on pregnancy risks and when to seek care. Methods: Interview questions and questionnaires were the main data collection tools. Six gynecologists and four midwives were interviewed, while 168 pregnant women and 14 recent mothers participated in the questionnaires. Results: With the rise in mobile technology and Internet penetration in Tanzania, more women are seeking information through online sources. However, for women to trust these sources, medical experts have to be involved in developing the systems. Conclusion: Through expert systems diagnosis of pregnancy complications and recommendations from experts can be made available to pregnant women in Tanzania. In addition, self-care education during pregnancy will save women money and reduce hospital loads in Tanzania.
20

Li, Ming, Jun Wang, and Yingcheng Xu. "An approach to the match between panels of experts and groups of demanders in fuzzy linguistic environments." Kybernetes 46, no. 5 (May 2, 2017): 854–75. http://dx.doi.org/10.1108/k-08-2016-0221.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Consulting experts is an effective way to utilize tacit resource. The purpose of the paper is to optimize the matching between panels of experts and groups of demanders to improve the efficiency of tacit knowledge sharing. Design/methodology/approach Experts and demanders express preferences using linguistic terms. The estimate method based on trust is developed to get missing ratings. Weights of demanders are determined and knowledge needs are identified. Three kinds of satisfaction are measured based on grey relational analysis. To maximize satisfaction of experts and demanders and safeguard meetings of knowledge needs as well as the workload of experts, the optimization model is constructed and the solution is optimal matching results. Findings The presented approach not only optimizes the matching between demanders and experts but also sets up a panel of experts in case that knowledge needs exceed a single expert’s capacity. Research limitations/implications The approach expands research works of methods for tacit knowledge sharing. The continuous updating of matching results and the processing of the data with mixing formats need to be studied further. Practical implications The presented approach acts as a valuable reference for the development of knowledge management systems. It can be used in any scene that needs the match between experts and demanders. Originality/value The approach provides a new way of helping demanders to find appropriate experts. Both experts’ and demanders’ preferences are considered. A panel of experts is set up when needed. Expert resources are utilized more efficiently and knowledge needs are met more comprehensively.
21

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (April 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.
22

Prasad, Durga, Niranjan N. Chiplunkar, and K. Prabhakar Nayak. "A Trusted Ubiquitous Healthcare Monitoring System for Hospital Environment." International Journal of Mobile Computing and Multimedia Communications 8, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijmcmc.2017040102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Wireless Body Sensor Network with wearable and implantable body sensors have been grabbing lot of interests among the researchers and healthcare service providers. These sensors forward physiological data to the personnel at the hospital, doctor or caretaker anytime, anywhere; hence the name of the network is Ubiquitous health monitoring system. The technology has brought Internet of Things into this system making it to get connected to the cloud based internet. This has made the retrieval of information to the expert and thus improving the happiness of elderly people and patients suffering from chronic diseases. This paper focuses on creating an android based application for monitoring patients in hospital environment. The necessity of sharing hospital data to the experts around the globe has brought the necessity of trust in Health care systems. The data sharing in the IOT environment is secured. The environment is tested in real-time cloud environment. The proposed android application serves to be better architecture for hospital monitoring.
23

Choi, Seung Yeoun, and Sean Hay Kim. "Knowledge Acquisition and Representation for High-Performance Building Design: A Review for Defining Requirements for Developing a Design Expert System." Sustainability 13, no. 9 (April 21, 2021): 4640. http://dx.doi.org/10.3390/su13094640.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
New functions and requirements of high performance building (HPB) being added and several regulations and certification conditions being reinforced steadily make it harder for designers to decide HPB designs alone. Although many designers wish to rely on HPB consultants for advice, not all projects can afford consultants. We expect that, in the near future, computer aids such as design expert systems can help designers by providing the role of HPB consultants. The effectiveness and success or failure of the solution offered by the expert system must be affected by the quality, systemic structure, resilience, and applicability of expert knowledge. This study aims to set the problem definition and category required for existing HPB designs, and to find the knowledge acquisition and representation methods that are the most suitable to the design expert system based on the literature review. The HPB design literature from the past 10 years revealed that the greatest features of knowledge acquisition and representation are the increasing proportion of computer-based data analytics using machine learning algorithms, whereas rules, frames, and cognitive maps that are derived from heuristics are conventional representation formalisms of traditional expert systems. Moreover, data analytics are applied to not only literally raw data from observations and measurement, but also discrete processed data as the results of simulations or composite rules in order to derive latent rule, hidden pattern, and trends. Furthermore, there is a clear trend that designers prefer the method that decision support tools propose a solution directly as optimizer does. This is due to the lack of resources and time for designers to execute performance evaluation and analysis of alternatives by themselves, even if they have sufficient experience on the HPB. However, because the risk and responsibility for the final design should be taken by designers solely, they are afraid of convenient black box decision making provided by machines. If the process of using the primary knowledge in which frame to reach the solution and how the solution is derived are transparently open to the designers, the solution made by the design expert system will be able to obtain more trust from designers. This transparent decision support process would comply with the requirement specified in a recent design study that designers prefer flexible design environments that give more creative control and freedom over design options, when compared to an automated optimization approach.
24

Liebertz, Scott. "Political Elites, Crime, and Trust in the Police in Latin America." International Criminal Justice Review 30, no. 2 (December 28, 2017): 175–96. http://dx.doi.org/10.1177/1057567717747012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article examines the effect of crime on support for criminal justice systems in Latin America. Scholars empirically demonstrate a strong negative effect of crime on support for institutions and satisfaction with democracy. Others provide thick descriptions of the prevalence of creeping authoritarianism in response to crime—the infamous “mano dura” or “iron fist.” I test the effectiveness of elite political messaging across different countries. In other words, do politicians that promote “iron-fist” policies reassure their intended audience and shore up support for the police and the criminal justice system? Analyzing survey data from the Latin American Public Opinion Project and Wiesehomeier and Benoit’s expert survey of Latin American political party platforms, I find that elite political opinion about insecurity conditions the effect of crime victimization and fear of crime on mass support for the police and the justice system as well as on perceptions of police and justice system effectiveness. When political elites emphasize mano dura (“iron fist”) solutions, fearful citizens and victims are less critical of the police and the justice system in general.
25

Ghode, Dnyaneshwar, Vinod Yadav, Rakesh Jain, and Gunjan Soni. "Adoption of blockchain in supply chain: an analysis of influencing factors." Journal of Enterprise Information Management 33, no. 3 (March 31, 2020): 437–56. http://dx.doi.org/10.1108/jeim-07-2019-0186.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
PurposeBlockchain technology (BT) is setting world-shattering standard in all type of transactions in business. BT has the prospective to drastically transform supply chain (SC). The main challenge is to enhance trust among the SC stakeholders. This paper aims to identify and prioritize the factors and its challenges that influence the adoptability of BT in SC. The prioritization of these factors will be helpful to the practitioners to decide the strategy of implementing the BT in SC.Design/methodology/approachThe factors influencing adoption of BT are identified from the review of literature and expert opinion is used to rank the factors influencing the adoptability of BT in SC using grey relational analysis (GRA).FindingsWe identified and prioritized key factors: inter-organizational trust and relational governance as organizational challenge, data transparency and data immutability as technological challenge, interoperability and product type as operational challenge and social influence and behavioral intention as social challenge that influences adoptability of BT in SC.Originality/valueThe priority of these factors will guide future researchers and industry practitioners to plan rational and financial strategy for implementing BT in SC.
26

Kaleta, Jeffrey P., and Lakshman Mahadevan. "Examining differences in perceptions of trust, privacy and risk in home and public Wi-Fi internet channels." Journal of Systems and Information Technology 12, no. 3 (July 23, 2020): 265–87. http://dx.doi.org/10.1108/jsit-04-2019-0075.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective. Design/methodology/approach Adapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels. Findings The results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies. Originality/value To the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.
27

Campbell, Curtis C. "Solutions for counteracting human deception in social engineering attacks." Information Technology & People 32, no. 5 (October 7, 2019): 1130–52. http://dx.doi.org/10.1108/itp-12-2017-0422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this paper is to investigate the top three cybersecurity issues in organizations related to social engineering and aggregate solutions for counteracting human deception in social engineering attacks. Design/methodology/approach A total of 20 experts within Information System Security Association participated in a three-round Delphi study for aggregating and condensing expert opinions. Three rounds moved participants toward consensus for solutions to counteract social engineering attacks in organizations. Findings Three significant issues: compromised data; ineffective practices; and lack of ongoing education produced three target areas for implementing best practices in countering social engineering attacks. The findings offer counteractions by including education, policies, processes and continuous training in security practices. Research limitations/implications Study limitations include lack of prior data on effective social engineering defense. Research implications stem from the psychology of human deception and trust with the ability to detect deception. Practical implications Practical implications relate to human judgment in complying with effective security policies and programs and consistent education and training. Future research may include exploring financial, operational and educational costs of implementing social engineering solutions. Social implications Social implications apply across all knowledge workers who benefit from technology and are trusted to protect organizational assets and intellectual property. Originality/value This study contributes to the field of cybersecurity with a focus on trust and human deception to investigate solutions to counter social engineering attacks. This paper adds to under-represented cybersecurity research regarding effective implementation for social engineering defense.
28

Blanchard, Nicolas K. "Building Trust for Sample Voting." International Journal of Decision Support System Technology 10, no. 4 (October 2018): 50–64. http://dx.doi.org/10.4018/ijdsst.2018100104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article explores how to build popular trust for voting systems that rely heavily on statistical tools, as they are generally counter-intuitive to the average citizen (and even to experts). By trying out the voting system in public and letting people tinker with it, a first level of familiarity can be achieved. Preliminary results from real-world experiments seem encouraging and point out the importance of psychological and sociological factors in election organization as well as the influence of user interface design. To go further, integration into a larger debating platform held by a national party could give first-hand experience to the majority of the people, and would progressively build trust as the political stakes grow higher. Finally, the authors look into how different e-democratic tools could interact in a mutually beneficial manner.
29

Hasselgren, Anton, Jens-Andreas Hanssen Rensaa, Katina Kralevska, Danilo Gligoroski, and Arild Faxvaag. "Blockchain for Increased Trust in Virtual Health Care: Proof-of-Concept Study." Journal of Medical Internet Research 23, no. 7 (July 30, 2021): e28496. http://dx.doi.org/10.2196/28496.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background Health care systems are currently undergoing a digital transformation that has been primarily triggered by emerging technologies, such as artificial intelligence, the Internet of Things, 5G, blockchain, and the digital representation of patients using (mobile) sensor devices. One of the results of this transformation is the gradual virtualization of care. Irrespective of the care environment, trust between caregivers and patients is essential for achieving favorable health outcomes. Given the many breaches of information security and patient safety, today’s health information system portfolios do not suffice as infrastructure for establishing and maintaining trust in virtual care environments. Objective This study aims to establish a theoretical foundation for a complex health care system intervention that aims to exploit a cryptographically secured infrastructure for establishing and maintaining trust in virtualized care environments and, based on this theoretical foundation, present a proof of concept that fulfills the necessary requirements. Methods This work applies the following framework for the design and evaluation of complex intervention research within health care: a review of the literature and expert consultation for technology forecasting. A proof of concept was developed by following the principles of design science and requirements engineering. Results This study determined and defined the crucial functional and nonfunctional requirements and principles for enhancing trust between caregivers and patients within a virtualized health care environment. The cornerstone of our architecture is an approach that uses blockchain technology. The proposed decentralized system offers an innovative governance structure for a novel trust model. The presented theoretical design principles are supported by a concrete implementation of an Ethereum-based platform called VerifyMed. Conclusions A service for enhancing trust in a virtualized health care environment that is built on a public blockchain has a high fit for purpose in Healthcare 4.0.
30

Nilashi, Mehrbakhsh, Karamollah Bagherifard, Othman Ibrahim, Nasim Janahmadi, and Mousa Barisami. "An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce." Engineering 03, no. 11 (2011): 1063–71. http://dx.doi.org/10.4236/eng.2011.311132.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Awad, Mohammed, and Ernst L. Leiss. "Paper Records and Electronic Audits: A Step Towards Regaining Voter Trust." JeDEM - eJournal of eDemocracy and Open Government 2, no. 1 (April 25, 2010): 69–78. http://dx.doi.org/10.29379/jedem.v2i1.12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The shortcomings of the voting systems used in the 2000 presidential election raised the awareness of the need to replace these systems. As a result, with the funds of Help America Vote Act (HAVA), many US states switched to Direct Recording Electronic (DRE) voting systems before the 2004 elections. Unfortunately these paperless voting machines were not as secure and efficient as state officials had hoped. Since their implementation, many studies have shown the threats of these systems and their flaws. While some data security experts tried to improve these voting systems, many discouraged their use and recommended more transparent methods.Although, several countries in Europe and around the world have successfully utilized E-voting, many US districts and states still don’t trust this technology and are returning to paper ballots. In this paper, we will propose a new system as a solution to the current problems. This approach combines the advantages of both paper ballots and Direct Recording Electronic (DRE) voting systems while avoiding the major flaws of these systems.
32

Pender, Erica Romero, Patricia Elgoibar, Lourdes Munduate, Ana Belén García, and Martin C. Euwema. "Improving social dialogue: What employers expect from employee representatives." Economic and Labour Relations Review 29, no. 2 (November 10, 2017): 169–89. http://dx.doi.org/10.1177/1035304617739506.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The model of social dialogue within organisations between management and employees is facing unprecedented challenges, and changing rapidly. In this new context of labour relations, experiences and expectations of each other are key drivers for the primary parties to this social dialogue. There has been little systematic research investigating the conditions for constructive social dialogue, particularly when it comes to ‘soft factors’, such as perceived competences, trust, influence and conflict behaviours. Addressing these issues based on theories of conflict, trust and influence, this article investigates experiences and expectations of employee representatives on the part of human resource managers, their counterparts in social dialogue. The results of surveys conducted in 11 European countries indicate that, overall, employers found a model of structured dialogue with elected employee representatives useful. Furthermore, competences of employee representatives, cooperative conflict behaviours, informal relations and trust promoted the influence of employee representatives on organisational decision-making and the quality of these decisions. We discuss implications for different systems of industrial relations. JEL Code: J50
33

Mahbooba, Basim, Mohan Timilsina, Radhya Sahal, and Martin Serrano. "Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model." Complexity 2021 (January 28, 2021): 1–11. http://dx.doi.org/10.1155/2021/6634811.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence (XAI) has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The previous studies focused more on the accuracy of the various classification algorithms for trust in IDS. They do not often provide insights into their behavior and reasoning provided by the sophisticated algorithm. Therefore, in this paper, we have addressed XAI concept to enhance trust management by exploring the decision tree model in the area of IDS. We use simple decision tree algorithms that can be easily read and even resemble a human approach to decision-making by splitting the choice into many small subchoices for IDS. We experimented with this approach by extracting rules in a widely used KDD benchmark dataset. We also compared the accuracy of the decision tree approach with the other state-of-the-art algorithms.
34

Wulf, Anna, and Lynne Butel. "Knowledge sharing and collaborative relationships in business ecosystems and networks." Industrial Management & Data Systems 117, no. 7 (August 14, 2017): 1407–25. http://dx.doi.org/10.1108/imds-09-2016-0408.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The sharing of knowledge between partners in collaborative relationships is widely accepted to be fundamental to supporting strategic decision making, particularly in relation to innovation management and business sustainability. The purpose of this paper is to focus on how the structure of collaborative relationships in business networks may determine successful knowledge sharing and thus improve decision making and business performance. Design/methodology/approach Expert interviews were conducted with participants operating in networks and business ecosystem in four different sectors in Italy and Germany, exploring the process of knowledge sharing, organisational learning and decision making within collaborative relationships. A qualitative textual analysis was used to analyse the experts’ responses. Findings The research found that an organisation’s network position and the network structure, as well as the governance and richness of the business ecosystem in which it operates, influence its ability to share knowledge, to innovate and therefore to compete sustainably. Research limitations/implications The research demonstrates that innovative strategic decision making, based on access to appropriate knowledge, occurs within the context of social and business network relations operating within a broader more diverse business ecosystem. Closer dyadic or small working group ties best facilitate trust and sharing of the most valuable knowledge. Appropriate participation in and management of such structures is therefore essential to support knowledge-based decision making, and critical to sustained competitive advantage. Originality/value The research focusses on how interfirm relationships are established and maintained, how firms establish trust and facilitate knowledge sharing forming the basis of organisational learning.
35

Hesselman, Cristian, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, et al. "A Responsible Internet to Increase Trust in the Digital World." Journal of Network and Systems Management 28, no. 4 (September 7, 2020): 882–922. http://dx.doi.org/10.1007/s10922-020-09564-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of trust and sovereignty for critical service providers (e.g., power grids) and all kinds of other users by improving the transparency, accountability, and controllability of the Internet at the network-level. A responsible Internet accomplishes this through two new distributed and decentralized systems. The first is the Network Inspection Plane (NIP), which enables users to request measurement-based descriptions of the chains of network operators (e.g., ISPs and DNS and cloud providers) that handle their data flows or could potentially handle them, including the relationships between them and the properties of these operators. The second is the Network Control Plane (NCP), which allows users to specify how they expect the Internet infrastructure to handle their data (e.g., in terms of the security attributes that they expect chains of network operators to have) based on the insights they gained from the NIP. We discuss research directions and starting points to realize a responsible Internet by combining three currently largely disjoint research areas: large-scale measurements (for the NIP), open source-based programmable networks (for the NCP), and policy making (POL) based on the NIP and driving the NCP. We believe that a responsible Internet is the next stage in the evolution of the Internet and that the concept is useful for clean slate Internet systems as well.
36

Tam, Carlos, Ana Loureiro, and Tiago Oliveira. "The individual performance outcome behind e-commerce." Internet Research 30, no. 2 (October 22, 2019): 439–62. http://dx.doi.org/10.1108/intr-06-2018-0262.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose While most e-commerce studies focus on the understanding of online customer behaviour, mainly adoption and purchase behaviours. The purpose of this paper is to examine the relationship between e-commerce and individual performance. The authors test the role of systems, information and service quality in e-commerce use and user satisfaction. Trust may become an important aspect for a consumer’s decision making, based on this the authors identify the effect of the role of trust on e-commerce use, user satisfaction and its impact on individual performance. This research has theoretical and managerial implications, since the protagonism of e-commerce is increasing in both academia and industry. Design/methodology/approach The authors apply a research model that integrates information systems success dimensions and user behaviour in the form of trust. The empirical approach was based on an online survey questionnaire of 437 individuals from Portugal. Findings The results reveal that overall quality and overall trust are important to explain use and user satisfaction in the context of e-commerce, which further leads to individual performance. The findings indicate that a higher level of use and user satisfaction increase individual performance. Originality/value The authors integrate information systems success dimensions and overall trust to understand the significance of e-commerce individual performance. The authors expect the results to enrich the understanding of the importance of considering both technological and behavioural factors to increase the success of e-commerce.
37

Fouladi, Parisa, and Nima Jafari Navimipour. "Human resources ranking in a cloud-based knowledge sharing framework using the quality control criteria." Kybernetes 46, no. 5 (May 2, 2017): 876–92. http://dx.doi.org/10.1108/k-01-2017-0007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose This paper aims to propose a new method for evaluating the quality and prioritizing of the human resources (HRs) based on trust, reputation, agility, expertise and cost criteria in the expert cloud. To evaluate some quality control (QC) factors, a model based on the SERVQUAL is used. Design/methodology/approach The aim of this paper is to offer a fast and simple method for selecting the HRs by the customers. To achieve this goal, the ranking diagram of different HRs based on the different criteria of QC is provided. By means of this method, the customer can rapidly decide on the selection of the required HRs. By using the proposed method, the scores for various criteria are evaluated. These criteria are used in the ranking of each HR which is obtained based on the evaluation conducted by previous customers and their colleagues. First, customers were asked to select their needed criteria and then by constructing a hierarchical structure, the ranking diagram of different HRs is achieved. Using a ranking system based on evaluating the quality of the model, satisfy the customer needs to be based on the properties of HRs. Also, an analytical hierarchical process-based ranking mechanism is proposed to solve the problem of assigning weights to features for considering the interdependence between them to rank the HRs in the expert cloud. Findings The obtained results showed the applicability of the radar graph using a case study and also numerically obtained results showed that a hierarchical structure increases the quality and speed rating of HR ranking than the previous works. Originality/value The suggested ranking method in this paper allows the optimal selection due to the special needs of any given customer in the expert cloud.
38

Aseeva, Irina. "Systems of Socio-Humanitarian Expertise in Technoscience: Global Experience in Review." Science Governance and Scientometrics 16, no. 2 (June 1, 2021): 223–41. http://dx.doi.org/10.33873/2686-6706.2021.16-2.223-241.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Introduction. This article is dedicated to the highly relevant philosophical and methodological problem of organising effective social oversight for developing and implementation innovative technoscientific projects. The fundamental transformations that science has induced in matters of production and its associated technological/socio-administrative functions have made this topic all the more relevant, to the detriment of its humanistic component. The intensive expansion of technosciences into all spheres of human existence accentuates the risks typically associated with it. The nature of the technoscience thus requires transdisciplinary comprehension and reorientation towards traditional human values — those of truth and common good. An effective mechanism for social reflection on the achievements of technoscience falls under the purview of socio-humanitarian expertise. This expertise dictates that we must attract not only the elite scientific community but also social institutions, public organisations and broad masses of volunteers — non-professional experts who possess the ability for creative self-organisation and can provide useful insights. Methods. We have employed comparative analytical methods of real experiences to establish the relevance of the main provisions of the Russian socio-humanitarian expertise to foreign approaches and programmes, such as Responsible Research and Innovation, Social Assessment of Technology, among others, defining the ethically acceptable contours of modern technoscience. Results and Discussion. To accomplish this task, we researched American, Western European and Russian philosophers of science and technology and the empirical materials of domestic and foreign sociology of science, in which the results of public reflection on techno-scientific achievements are recorded. We also analysed opinion polls and expert interviews on the problems of socio-humanitarian expertise. Conclusion. Based on an analysis of studies devoted to the ethical aspects of modern technoscience, gaps and shortcomings of the existing methods and techniques of socio-humanitarian expertise are identified, and examples of successful communication between science and society are demonstrated in order to increase social trust in modern technoscience and reduce potential risks.
39

Zineddine, Mhamed. "A novel trust model for fog computing using fuzzy neural networks and weighted weakest link." Information & Computer Security 28, no. 5 (June 19, 2020): 763–800. http://dx.doi.org/10.1108/ics-04-2019-0046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network. Design/methodology/approach The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm. Findings The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network. Research limitations/implications Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available. Originality/value The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.
40

Boldyreva, Elena. "Approach to automation of workshop design processes based on opinions of employers." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (January 27, 2020): 94–104. http://dx.doi.org/10.24143/2072-9502-2020-1-94-104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article presents the results of studying the characteristics of the workshop design process of the actively developing science-intensive areas that have a high degree of variability of the technologies used and the requirements for the skills of specialists in the industry. The approach to organizing the automated design process for the daily workshops on the basis of expert opinions of the trainees’ employers has been proposed. The approach implements the model of pedagogical design ADDIE at the stages of analysis and design and involves four stages: calculating the degree of trust in experts, selecting learning tasks for the discipline, developing the structure of the workshop taking into account the relevance of each learning task of the discipline for a particular training profile, and calculating the complexity and assessments (points) tasks for each profile. According to the introduced rule of assessment, calculation of weight coefficients for each of the learning tasks and the rule of ranking the selected tasks are arranged in the optimal order for studying, and an individual learning path for each professional profile is formed. The methods and algorithms described can be used to develop information systems for designing a workshop. A software package for instrumental and information support has been developed. It implements all the calculation and ranking functions and appears a system for the workshop automated design. Using this system and the proposed approach, the structure and the list of learning tasks of the workshop on the discipline “Embedded Systems” are formed. The proposed solutions allow an iterative assessment of the relevance of learning tasks of the discipline taking into account the expert opinions of potential employers and improve the real model of training specialists due to the high practical importance of the workshop and, as a result, to the high motivation of the trainees to obtain professional practical skills that are in demand in the labor market.
41

Heilemann, Felix, Sebastian Lindner, and Axel Schulte. "Experimental evaluation of tasking and teaming design patterns for human delegation of unmanned vehicles." Human-Intelligent Systems Integration 3, no. 3 (August 13, 2021): 223–40. http://dx.doi.org/10.1007/s42454-021-00036-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThis work discusses different approaches for the cooperation between humans as a supervisor and multiple unmanned vehicles (UVs). We evaluated the most promising approach experimentally with expert pilots of the German Air Force. The co-agency of humans and highly automated unmanned systems (i.e., human autonomy teaming, HAT) is described by the use of a design and description language for HAT design patterns. This design language is used to differentiate control modes for tasking, teaming, and swarming of UVs. The different control modes are then combined in a planner agent (PA) design pattern that further enables the UV guidance on scalable delegation levels from a single individual up to a team. The desired system behavior and interaction concept of the PA for these scalable delegation levels is then transferred to the domain of manned-unmanned teaming in fighter aircraft missions. To demonstrate the applicability of the system, we implemented the concept into our fast-jet simulator of the Institute of Flight Systems (IFS) and conducted an experimental campaign with expert pilots. The results of the experiment showed (1) task delegation with the PA design pattern is faster and reduces the error potential; (2) scalable delegation levels enable a pilot and situation-specific task delegation; (3) the delegation of teams is faster and reduces the error potential; however, in some situations, deeper access through the scalable delegation levels is needed; (4) the concept is intuitive and the transparency and trust in UVs and swarms were very high; and (5) the pilots could imagine operating such systems in the future. Overall speaking the presented PA design pattern is suited for the guidance of UVs and the scalable delegation levels are beneficial.
42

Feldhütter, Anna, Christian Gold, Adrian Hüger, and Klaus Bengler. "Trust in Automation as a Matter of Media Influence and Experi-ence of Automated Vehicles." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 2024–28. http://dx.doi.org/10.1177/1541931213601460.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Highly automated vehicles (HAV), which could help to enhance road safety and efficiency, are very likely to enter the market within the next decades. To have an impact, these systems need to be purchased, which is a matter of trust and acceptance. These factors are dependent on the level of information that one has about such systems. One important source of information is various media, such as newspapers, magazines and videos, in which highly automated driving (HAD) is currently a frequent topic of discussion. To evaluate the influence of media on the perception of HAD, 31 participants were presented with three different types of media addressing HAD in a neutral manner. Afterwards, the participants experienced HAD in the driving simulator. In between these steps, the participants completed questionnaires assessing comfort, trust in automation, increase in safety, intention to use and other factors in order to analyze the effect of the media and the driving simulation experience. Results indicate that the perception of some aspects of HAD were affected by the media presented, while experiencing HAD in the driving simulator generally did not have an effect on the attitude of the participants. Other aspects, such as trust, were not affected by either media or experience. In addition, gender-related differences in the perception of HAD were found.
43

Shi, Mingyue, Rong Jiang, Wei Zhou, Sen Liu, and Savio Sciancalepore. "A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory." Security and Communication Networks 2020 (September 29, 2020): 1–18. http://dx.doi.org/10.1155/2020/5610839.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Information leakage in the medical industry has become an urgent problem to be solved in the field of Internet security. However, due to the need for automated or semiautomated authorization management for privacy protection in the big data environment, the traditional privacy protection model cannot adapt to this complex open environment. Although some scholars have studied the risk assessment model of privacy disclosure in the medical big data environment, it is still in the initial stage of exploration. This paper analyzes the key indicators that affect medical big data security and privacy leakage, including user access behavior and trust, from the perspective of users through literature review and expert consultation. Also, based on the user’s historical access information and interaction records, the user’s access behavior and trust are quantified with the help of information entropy and probability, and a definition expression is given explicitly. Finally, the entire experimental process and specific operations are introduced in three aspects: the experimental environment, the experimental data, and the experimental process, and then, the predicted results of the model are compared with the actual output through the 10-fold cross verification with Matlab. The results prove that the model in this paper is feasible. In addition, the method in this paper is compared with the current more classical medical big data risk assessment model, and the results show that when the proportion of illegal users is less than 15%, the model in this paper is more superior in terms of accuracy and recall.
44

Sanders, Justin J., Kimberly S. Johnson, Kimberly Cannady, Joanna Paladino, Dee W. Ford, Susan D. Block, and Katherine R. Sterba. "From Barriers to Assets: Rethinking factors impacting advance care planning for African Americans." Palliative and Supportive Care 17, no. 03 (June 5, 2018): 306–13. http://dx.doi.org/10.1017/s147895151800038x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractObjectiveWe aimed to explore multiple perspectives regarding barriers to and facilitators of advance care planning (ACP) among African Americans to identify similarities or differences that might have clinical implications.MethodQualitative study with health disparities experts (n = 5), community members (n = 9), and seriously ill African American patients and caregivers (n = 11). Using template analysis, interviews were coded to identify intrapersonal, interpersonal, and systems-level themes in accordance with a social ecological framework.ResultParticipants identified seven primary factors that influence ACP for African Americans: religion and spirituality; trust and mistrust; family relationships and experiences; patient-clinician relationships; prognostic communication, care preferences, and preparation and control. These influences echo those described in the existing literature; however, our data highlight consistent differences by group in the degree to which these factors positively or negatively affect ACP. Expert participants reinforced common themes from the literature, for example, that African Americans were not interested in prognostic information because of mistrust and religion. Seriously ill patients were more likely to express trust in their clinicians and to desire prognostic communication; they and community members expressed a desire to prepare for and control the end of life. Religious belief did not appear to negate these desires.Significance of resultsThe literature on ACP in African Americans may not accurately reflect the experience of seriously ill African Americans. What are commonly understood as barriers to ACP may in fact not be. We propose reframing stereotypical barriers to ACP, such as religion and spirituality, or family, as cultural assets that should be engaged to enhance ACP. Although further research can inform best practices for engaging African American patients in ACP, findings suggest that respectful, rapport-building communication may facilitate ACP. Clinicians are encouraged to engage in early ACP using respectful and rapport building communication practices, including open-ended questions.
45

Muliadi, Muliadi, Irwan Budiman, Muhammad Adhitya Pratama, and Antar Sofyan. "FUZZY DAN DEMPSTER-SHAFER PADA SISTEM PAKAR DIAGNOSA PENYAKIT TANAMAN CABAI." KLIK - KUMPULAN JURNAL ILMU KOMPUTER 4, no. 2 (September 28, 2017): 209. http://dx.doi.org/10.20527/klik.v4i2.116.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p><em>Expert systems are usually used only to help get the results of a diagnosis faster. In the expert system, a method usually used to support a diagnosis process. In this research using the method of Fuzzy and Dempster-Shafer. Fuzzy methods used to find the scale of values belief (trust) a fact with fuzzyficationt process, while the Dempster-Shafer method used to combine pieces of the facts to calculate the likelihood of an event. The purpose of this study was to determine whether the method of Fuzzy and Dempster-Shafer can be applied to the expert system to provide disease diagnosis chili. Where the results of the expert system will produce a presentation about the likelihood of diagnosis of plant diseases chili.</em><em></em></p><p><strong><em>Keywords</em></strong><em> : Fuzzy Logic, Dempster-Shafer, Expert System, Chili Plants<strong></strong></em></p><p><em>Sistem pakar biasanya digunakan hanya untuk membantu memperoleh hasil suatu diagnosa dengan lebih cepat. Pada sistem pakar, biasanya digunakan suatu metode untuk mendukung proses suatu diagnosa. Pada penelitian ini menggunakan bantuan metode Fuzzy dan Dempster-Shafer. Metode Fuzzy digunakan untuk mencari bobot nilai belief (kepercayaan) suatu fakta dengan proses fuzzyfikasi, sedangkan metode Dempster-Shafer digunakan untuk menggabungkan potongan fakta untuk mengkalkulasi kemungkinan dari suatu peristiwa. Tujuan dari penelitian ini adalah untuk mengetahui apakah metode Fuzzy dan Dempster-Shafer dapat diterapkan pada sistem pakar dalam memberikan diagnosa penyakit cabai. Dimana hasil dari sistem pakar ini akan menghasilkan presentasi besarnya kemungkinan terdiagnosanya penyakit tanaman cabai.</em><em></em></p><p><strong><em>Kata kunci</em></strong><em> : Logika Fuzzy, Dempster-Shafer, Sistem Pakar, Tanaman Cabai</em></p>
46

Grace, Anthony Richard, Lorelle Frazer, Scott K. Weaven, and Rajiv P. Dant. "Building franchisee trust in their franchisor: insights from the franchise sector." Qualitative Market Research: An International Journal 19, no. 1 (January 11, 2016): 65–83. http://dx.doi.org/10.1108/qmr-09-2014-0085.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – The purpose of this research is to identify the critical determinants of a franchisee’s trust in their franchisor. Design/methodology/approach – A qualitative approach was used, and 30 interviews were conducted with franchising participants. The first phase of the research consisted of exploratory interviews with franchising experts (franchise lawyers, accountants, consultants, mediators and bankers), and the second phase consisted of semi-structured interviews with franchisees and franchisors across two franchise systems. Findings – The research revealed five critical determinants of a franchisee’s trust in their franchisor: franchisee’s engagement in the system, franchisee’s confidence in the system, franchisee’s perception of a strong team culture, franchisee’s perception of franchisor competence and franchisee’s perception of franchisor character. Practical implications – The research provides insight into how the aforementioned components can be developed within a franchise system to build franchisee trust. The paper also concludes with four practical recommendations that can be integrated within a franchise system to increase levels of franchisee trust. Originality/value – This research builds on prior research into franchisee trust, providing an original contribution to the literature through the development of a practical model, showcasing critical determinants of a franchisee’s trust in their franchisor.
47

Brooke, Phil, and Richard Paige. "User-visible cryptography in email and web scenarios." Information & Computer Security 23, no. 1 (March 9, 2015): 58–72. http://dx.doi.org/10.1108/ics-07-2013-0054.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users. Design/methodology/approach – The authors review the existing literature, and then identify user stories typical to their users of interest. They analyse the risks, mitigations of risks and the limits of those mitigations in the user stories. Findings – The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for the users. Research limitations/implications – Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. The authors suggest that deployed systems should rely on automation rather than explicit user involvement; further work on how best to involve users effectively remains valuable. Practical implications – Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors. Social implications – The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence. Originality/value – This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. The authors concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).
48

Kulpa, Zenon, Aleksander Radomski, Olaf Gajl, Michał Kleiber, and Iwona Skalna. "Hybrid expert system for qualitative and quantitative analysis of truss structures." Engineering Applications of Artificial Intelligence 12, no. 2 (April 1999): 229–40. http://dx.doi.org/10.1016/s0952-1976(98)00067-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Gale, Fred, Francisco Ascui, and Heather Lovell. "Sensing Reality? New Monitoring Technologies for Global Sustainability Standards." Global Environmental Politics 17, no. 2 (May 2017): 65–83. http://dx.doi.org/10.1162/glep_a_00401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the 1990s, civil society organizations partnered with business to “green” global supply chains by setting up formal sustainability standard-setting organizations (SSOs) in sectors including organic food, fair trade, forestry, and fisheries. Although SSOs have withstood the long-standing allegations that they are unnecessary, costly, nondemocratic, and trade-distorting, they must now respond to a new challenge, arising from recent developments in technology. Conceived in the pre-Internet era, SSOs are discovering that verification systems that utilize annual, expert-led, low-tech field audits are under pressure from new information and communication technologies that collect, aggregate, interpret, and display open-source “Big Data” in almost real time. Drawing on the concept of governmentality and on interviews with experts in sustainability certification and natural capital accounting, we argue that while these technological developments offer many positive opportunities, they also enable competing alternatives to the prevailing “truth” or governing rationality about what is happening “on the ground,” which is of critical existential importance to SSOs as guarantors of trust in claims about sustainable production. While SSOs are not helpless in the face of this challenge, we conclude that they will need to do more than take incremental action: rather, they should respond actively to the disintermediation challenge from new virtual monitoring technologies if they are to remain relevant in the coming decade.
50

Beheshti, Amin, Shahpar Yakhchi, Salman Mousaeirad, Seyed Mohssen Ghafari, Srinivasa Reddy Goluguri, and Mohammad Amin Edrisi. "Towards Cognitive Recommender Systems." Algorithms 13, no. 8 (July 22, 2020): 176. http://dx.doi.org/10.3390/a13080176.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Intelligence is the ability to learn from experience and use domain experts’ knowledge to adapt to new situations. In this context, an intelligent Recommender System should be able to learn from domain experts’ knowledge and experience, as it is vital to know the domain that the items will be recommended. Traditionally, Recommender Systems have been recognized as playlist generators for video/music services (e.g., Netflix and Spotify), e-commerce product recommenders (e.g., Amazon and eBay), or social content recommenders (e.g., Facebook and Twitter). However, Recommender Systems in modern enterprises are highly data-/knowledge-driven and may rely on users’ cognitive aspects such as personality, behavior, and attitude. In this paper, we survey and summarize previously published studies on Recommender Systems to help readers understand our method’s contributions to the field in this context. We discuss the current limitations of the state of the art approaches in Recommender Systems and the need for our new approach: A vision and a general framework for a new type of data-driven, knowledge-driven, and cognition-driven Recommender Systems, namely, Cognitive Recommender Systems. Cognitive Recommender Systems will be the new type of intelligent Recommender Systems that understand the user’s preferences, detect changes in user preferences over time, predict user’s unknown favorites, and explore adaptive mechanisms to enable intelligent actions within the compound and changing environments. We present a motivating scenario in banking and argue that existing Recommender Systems: (i) do not use domain experts’ knowledge to adapt to new situations; (ii) may not be able to predict the ratings or preferences a customer would give to a product (e.g., loan, deposit, or trust service); and (iii) do not support data capture and analytics around customers’ cognitive activities and use it to provide intelligent and time-aware recommendations.

До бібліографії