Dissertations / Theses on the topic 'Trust and ethics of computer systems'

To see the other types of publications on this topic, follow the link: Trust and ethics of computer systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Trust and ethics of computer systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Van, Wyk Byron Jay. "E-trust: a building block for developing valuable online platforms in Higher Education." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1852.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology Design in the Faculty of Informatics and Design at the Cape Peninsula University of Technology Supervisor: Prof J Messeter Cape Town, 2013
The aim of this research project was to provide an answer to the question: “How can an understanding of online trust be used to build valuable online applications in Higher Education?” In order to present an answer to this question, a literature survey was conducted to establish: • An understanding of the phenomenon of online trust • What the factors are that influence a loss of trust in the online environment The literature survey highlighted several factors that influence a loss of trust in the online environment, called trust cues. These factors, however, were often tested within the E-commerce environment, and not in organization-specific contexts, such as online platforms in use in Higher Education. In order to determine whether or not these factors would influence the development of trust in context-specific environments, the author of this research grouped the indentified trust factors into three focus areas, i.e. content, ease of use, and navigation. These factors were then incorporated into a series of nine different prototypes. These prototypes were different versions of a particular online platform currently in use at the Cape Peninsula University of Technology (CPUT). The prototypes were tested over a three week period, with certain staff members at the institution in question recruited as test participants. During each week of user observations, a different focus area was targeted, in order to establish the impact that it would have on the perceived trustworthiness of the platform in question. User observations were conducted while test participants completed a standard process using the various prototypes. Semi-structured interviews were also conducted while participants completed the specific process. Participants were asked to evaluate each screen in the process according to its perceived trust worthiness, by assigning a trust level score. At the completion of the three rounds of user observations, in-depth interviews were conducted with test participants. The participants’ trust level scores for each prototype were captured and graphed. A detailed description for the score given for a particular screen was presented on each graph. These scores were combined to provide an analysis of the focus area tested during the specific round. After the three rounds of user observations were completed, an analysis of all the trust factors tested were done. Data captured during interviews were transcribed, combined with feedback received from questionnaires, and analysed. An interpretation of the results showed that not all trust factors had a similar influence in the development of trust in the online platform under investigation. Trust cues such as content organization, clear instructions and useful content were by far the most significant trust factors, while others such as good visual design elements, professional images of products, and freedom from grammatical and typographical errors had little or no impact in the overall trustworthiness of the platform under investigation. From the analysis done it was clear that the development of trust in organization-specific contexts is significantly different than developing trust in an E-commerce environment and that factors that influence the development of trust in one context might not always be significant in another. In conclusion, it is recommended that when software applications are developed in organization-specific contexts, such as Higher Education, that trust factors such as good content organization, clear instructions and useful content be considered as the most salient. Organization-specific contexts differ quite significantly in that the users of these systems often convey a certain degree of trust toward the online platforms that they work with on a daily basis. Trust factors that are geared toward developing an initial or basic trust in a particular platform, which is often the case with first time users engaging in an E-commerce platform, would therefore not be as significant in the development of a more developed level of trust, which is what is needed within the development of organization-specific online platforms.
APA, Harvard, Vancouver, ISO, and other styles
2

Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006.
Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Weiliang. "Trust in distributed information systems." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/35454.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2008.
A thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.

Full text
Abstract:
Introducing trust and reputation into multi-agent systems can significantly improve the quality and efficiency of the systems. The computational trust and reputation also creates an environment of survival of the fittest to help agents recognize and eliminate malevolent agents in the virtual society. The thesis redefines the computational trust and analyzes its features from different aspects. A systematic model called Neural Trust Model for Multi-agent Systems is proposed to support trust learning, trust estimating, reputation generation, and reputation propagation. In this model, the thesis innovates the traditional Self Organizing Map (SOM) and creates a SOM based Trust Learning (STL) algorithm and SOM based Trust Estimation (STE) algorithm. The STL algorithm solves the problem of learning trust from agents' past interactions and the STE solve the problem of estimating the trustworthiness with the help of the previous patterns. The thesis also proposes a multi-agent reputation mechanism for generating and propagating the reputations. The mechanism exploits the patterns learned from STL algorithm and generates the reputation of the specific agent. Three propagation methods are also designed as part of the mechanism to guide path selection of the reputation. For evaluation, the thesis designs and implements a test bed to evaluate the model in a simulated electronic commerce scenario. The proposed model is compared with a traditional arithmetic based trust model and it is also compared to itself in situations where there is no reputation mechanism. The results state that the model can significantly improve the quality and efficacy of the test bed based scenario. Some design considerations and rationale behind the algorithms are also discussed based on the results.
APA, Harvard, Vancouver, ISO, and other styles
5

Chan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raval, Maharsh, and Rajkiran Sunkireddy. "Hardware Root of Trust on IoT Gateway." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40120.

Full text
Abstract:
Gateways play a vital role in the Internet of Things (IoT) infrastructure. Gateways are widely used and their usage range from industries to smart homes. As they have expanded nowadays to have internet connectivity which raises certain security issues like being exposed to various threats and cyber-attacks such as rootkits, bootkits. Many researches and developmentswere made to countermeasure these problems. One of the significant developments was Root ofTrust (RoT). RoT can be enabled both by using hardware such as a chip named Trusted PlatformModule (TPM) and using software like Trusted Execution Environment (TEE).We propose amethod on how to enable RoT using the chip TPM 2.0 on a product, a Gateway named GWen from the company HMS Industrial Networks AB using the TPM software stack TSS2.0. We have performed tests on cryptographic operations such as key generation, key usage, and secure key storage and have shown the results in this report. Based on our results, adding and enabling the TPM 2.0 to the GWen enhances the security of its Linux distribution and makes it possible tosecurely identify and authenticate the gateway based on its secret keys that are stored securelyinside it’s TPM.
APA, Harvard, Vancouver, ISO, and other styles
7

Huynh, Trung Dong. "Trust and reputation in open multi-agent systems." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/262759/.

Full text
Abstract:
Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system. This openness means existing trust and reputation models cannot readily be used since their performance suffers when there are various (unforseen) changes in the environment. To this end, this thesis develops and evaluates FIRE, a trust and reputation model that enables autonomous agents in open MAS to evaluate the trustworthiness of their peers and to select good partners for interactions. FIRE integrates four sources of trust information under the same framework in order to provide a comprehensive assessment of an agent’s likely performance in open systems. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation, that models trust resulting from direct experiences, role-based relationships, witness reports, and third-party references, respectively, to provide trust metrics in most circumstances. A novel model of reporter credibility has also been integrated to enable FIRE to effectively deal with inaccurate reports (from witnesses and referees). Finally, adaptive techniques have been introduced, which make use of the information gained from monitoring the environment, to dynamically adjust a number of FIRE’s parameters according to the actual situation an agent finds itself in. In all cases, a systematic empirical analysis is undertaken to evaluate the effectiveness of FIRE in terms of the agent’s performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Maiden, Wendy Marie. "Dualtrust a trust management model for swarm-based autonomic computing systems /." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Thesis/Spring2010/W_Maiden_6041310.pdf.

Full text
Abstract:
Thesis (M.A. in electrical engineering and computer science)--Washington State University, May 2010.
Title from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
APA, Harvard, Vancouver, ISO, and other styles
9

Lebedev, Ilia Andreevich. "Trust less : shrinking the trusted parts of trusted systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128315.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 213-227).
Modern computers, industrial control systems, and other automation are broadly vulnerable as a result of decades of systemic forces that have prioritized cost and performance over security. Computers across the board face a crisis in the form of motivated software adversaries with access to our imperfect and enormously complex software. Considering these weaknesses, trust in modern computing systems is often not well-placed. Looking ahead to a shift in our collective priorities, this thesis is centered around a rigorous discussion of hardware-assisted isolation and enclaves -- authenticated software modules -- as a means to drastically reduce the complexity of trusted systems. By allowing trustworthy enclaved software to co-exist with, but remain strongly isolated from, existing software, we enable a gentle transition toward trustworthy systems. Specifically, this thesis refines formal definitions of enclaved execution and threat model via a series of hardware and software co-designs. These case studies explore enclave processors with small trusted computing bases spanning a gradient from an embedded SoC to a modern high-performance processor. This work is complementary to, and enables more effective application of, many powerful ideas such as information flow control, formal verification, multi-party computation, and other tools for trustworthy computing.
by Ilia Andreevich Lebedev.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Fuk-Wing Thomas. "Preserving Trust Across Multiple Sessions in Open Systems." BYU ScholarsArchive, 2004. https://scholarsarchive.byu.edu/etd/137.

Full text
Abstract:
Trust negotiation, a new authentication paradigm, enables strangers on the Internet to establish trust through the gradual disclosure of digital credentials and access control policies. Previous research in trust negotiation does not address issues in preserving trust across multiple sessions. This thesis discusses issues in preserving trust between parties who were previously considered strangers. It also describes the design and implementation of trust preservation in TrustBuilder, a prototype trust negotiation system. Preserving trust information can reduce the frequency and cost of renegotiation. A scenario is presented that demonstrates that a server supporting trust preservation can recoup the cost of the trust preservation facility when approximately 25% of its requests are from repeat customers. The throughput and response time improve up to approximately 33% as the percentage of repeat customers grows to 100%.
APA, Harvard, Vancouver, ISO, and other styles
11

Wei, Chen. "Multi-collaborative filtering trust network for online recommendation systems." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Youssef, Ingy. "Trust via Common Languages." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469155513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ranjit, Narendran. "Multiagent Referral Systems: Maintaining and Applying Trust and Expertise Mode." NCSU, 2007. http://www.lib.ncsu.edu/theses/available/etd-05112007-143631/.

Full text
Abstract:
This thesis addresses the challenge of assisting people to solve a problem by helping locate other people who might have the expertise required to solve that problem. To this end, the proposed system assigns an agent to each user. Further, it models a social network as a multiagent system based on the user's existing online identity. It provides heuristics by which an agent can estimate the expertise and trust to be placed in a user with whom the agent's user interactis. Our approach seeks to reduce the problem of finding an answer to a query to the problem of finding a path to a trustworthy expert who can answer the query. To accomplish this, our system uses referrals from one agent to another in the same fashion that word-of-mouth is used when people are looking for an expert. Our models of trust help establish the authenticity and veracity of the referrals and replies. This thesis describes the architecture and implementation of such a system.
APA, Harvard, Vancouver, ISO, and other styles
14

Burnett, Christopher. "Trust assessment and decision-making in dynamic multi-agent systems." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=167031.

Full text
Abstract:
The concept of trust in multi-agent systems (MASs) has received significant attention in recent years, and a number of approaches have been proposed to enable agents to form, maintain and use trust relationships in their dealings with others.  However, current approaches do not adequately address highly dynamic multi-agent systems, where the population and structure changes frequently.  For example, agents may frequently join and leave, and ad-hoc structures may form in response to emerging situations. In these highly unstable environments, trust can be difficult or impossible to build with existing techniques.  Trust matters most when risk is involved, but in situations of extreme uncertainty, the risk may be too great to permit any interactions, resulting in a breakdown of the system. In this thesis, we propose a general approach for trust evaluation and decision-making in highly dynamic multi-agent systems.  First, we present a model of stereotypes, which allows agents to build tentative trust relationships with others on the basis of visible features.  We show that this approach can help agents to form trust relationships, despite a high degree of social dynamicity.  We present a method of selecting providers of trust evidence, when those providers may be stereotypically biased. Secondly, we present a trust decision-making model which employs controls, as well as trust evaluations and stereotypes, in order to facilitate initial interactions when trust is low or absent, and bootstrap dynamic societies.  We show that control can be used initially to enable interactions.  As trust builds, control can be reduced.  Our approach is general and applicable to existing models of trust in MASs.  We evaluate our model within a simulated multi-agent environment characterised by high degrees of dynamicity and structural change.
APA, Harvard, Vancouver, ISO, and other styles
15

Yu, Hong. "Creating Public Trust in Electronic Voting Systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224219.

Full text
Abstract:
There are many positive aspects of electronic voting systems: security, verifiability, convenience, resource conservation, and the like. However, there is still lack of trust for electronic voting systems within the public. One of the reasons could be that the notions involved in electronic voting are challenging to understand for the general public. In this project, we tried to create public trust through an explanation system. An explanation system was made to explain how a modern electronic voting system works. User testing was performed after that, to verify whether this explanation system is able to increase people’s trust in electronic voting system. After analysing the data collected through the user testing, we got promising results to believe that this explanation can be used to create public trust in electronic voting systems.
Det finns många positiva aspekter av elektroniska röstningssystem: säkerhet, verifierbarhet, bekvämlighet, resursbesparingar, och liknande. Emellertid så saknas det fortfarande hos allmänheten tillit till elektroniska röstningssystem. Ett av skälen till detta skulle kunna vara att idéerna i samband med elektronisk röstning är utmanande att förstå för allmänheten. I detta projekt har vi försökt att skapa allmän tillit med hjälp av ett förklaringssystem. Ett förklaringssystem tillverkades för att förklara hur ett modernt elektroniskt röstningssystem fungerar. Användartester utfördes därefter, för att verifiera huruvida detta förklaringssystem förmådde öka människors tillit till elektroniska röstningssystem. Efter analys av data insamlade genom användartesterna, fick vi lovande resultat som gav oss anledning att tro att detta slags förklaring kan användas för att skapa allmän tillit till elektroniska röstningssystem.
APA, Harvard, Vancouver, ISO, and other styles
16

Lind, Oros Martin. "Designing for Calibrated Trust Towards Operators of Highly Autonomous Vehicle Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283355.

Full text
Abstract:
Appropriate levels of trust in highly autonomous vehicles contributes to a safer human-machine relationship. Through increased correctness in interactions trust can be calibrated. Trust is formed via interactions that needs to be designed from a Human-Machine relationship with the purpose of maintaining it at an acceptable level. When failing calibrating trust to an appropriate level accidents and risks may arise due to over-reliance on, or the opposite, distrust on the system's capabilities. This study aims to investigate what factors of trust that can influence design decisions and the design process in order to let user's trust levels match the system's capabilities (i.e. calibrating trust) from a human-machine interface (HMI) perspective. The method of semi-structured expert interviews have given a basis to stand on in an idea generation workshop. The main results from this study are various ways to achieve transparency which in turn can be used to design for appropriate trust with the help of the generated concepts.
Lämpliga nivåer av tillit i högautomatiserade fordon bidrar till ökad säkerhet ur ett människa-maskin perspektiv. Genom att förbättra samverkan i automationen kan tillit kalibreras. Ur en människa-maskin relation och den samverkan som sker kan tillit formas med syftet att tillhandahållas på en acceptabel nivå. När kalibrering av tillit misslyckas och inte motsvarar denna nivå, vilket sker när det finns övertro, eller det motsatta, undertro på automationens förmågor kan säkehetsrisker uppstå. Den här studien undersöker vilka tillitsfaktorer som kan påverka designbeslut och designprocesser med syfte att låta användarnas tillitsnivå motsvara systemets förmåga genom fokus på ett människa-maskin gränssnitt. Semi-strukturerade expertintervjuer har lagt grunden till att genomföra en ”workshop” som givit upphov till ett antal koncept för att möjliggöra lämpliga nivåer av tillit. De huvudsakliga resultaten består följaktligen av ett flertal sätt att uppnå transparens samt flera koncept som kan användas för att designa lämpliga nivåer av tillit.
APA, Harvard, Vancouver, ISO, and other styles
17

Billqvist, Ung Malin, and David Neveceral. "Initial trust in e-health systems : How surface level user experience design can influence trust formation." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50175.

Full text
Abstract:
As e-health systems are becoming more common and necessary, it is an important field to explore. One important part that has not yet been explored enough is the formation of trust within e-health. An established approach to help formation of trust in other fields is that of user experience design. This Master thesis is focused on the topic of trust formation of first-time e-health service users and how user experience design can influence trust formation. For fulfilling the purpose, the method of think-aloud and semi-structured interviews were chosen. In addition to that, a prototype of an e-health service was developed. The outcome of the interviews was examined through a thematic analysis in order to answer the research questions. Based on the analysis, new aspects which influence trust formation on the surface level were identified, as well as some previously known were confirmed. The themes which are overlapping with previously conducted studies are Design feeling and Element placement. The newly identified themes contain Consistency, Colour and some aspects of Reading experience. The reasons for the identified aspects were categorized into the two themes of Craftsmanship and Expectations. Those findings were compared with previous studies, and recommendations for future research were formulated.
APA, Harvard, Vancouver, ISO, and other styles
18

Coetzee, Marijke. "WSACT - a model for Web Services Access Control incorporating Trust." Thesis, Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-07102008-075251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zou, Hai Tao. "Trust-Rank : a Cold-Start tolerant recommender system." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2182855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Specter, Michael Alan. "The economics of cryptographic trust : understanding certificate authorities." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104028.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Institute for Data, Systems, and Society, Technology and Policy Program, 2016.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 71-75).
Certificate Authorities (CAs) play a crucial role in HTTPS, the mechanism that secures all of the web's most important communication; if it has a log-in page, it must use HTTPS. However, recent history is littered with instances of CAs unabashedly undermining the trust model of the web in favor of economic gain, causing catastrophic harm to users in the process. The purpose of this thesis is to understand how well user, domain owner, and browser vendor controls function in order to evaluate methods of realigning CA incentives. Using a compendium of past incidents of CA failure as a series of natural experiments, along with a large dataset of all publicly available certificate collections, we find that it is possible to causally link a very slight increase in domain owners leaving a CA when a CA acts inappropriately. We further find that the technical architecture of the CA system leaves users without effective control over which CAs they trust, and that browsers face certain difficulty in distrusting larger CAs. The end result is a system where large CAs can unilaterally undermine the trust model of the web without clear repercussion.
by Michael Alan Specter.
S.M. in Technology and Policy
S.M.
APA, Harvard, Vancouver, ISO, and other styles
21

Imran, Muhammad. "The impact of consolidating web based social networks on trust metrics and expert recommendation systems." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/385200/.

Full text
Abstract:
Individuals are typically members of a variety of web-based social networks (both explicit and implied), but existing trust inference mechanisms typically draw on only a single network to calculate trust between any two individuals. This reduces both the likelihood that a trust value can be calculated (as both people have to be members of the same network), and the quality of any trust inference that can be drawn (as it will be based on only a single network, typically representing a single type of relationship). To make trust calculations on Multiple Distributed (MuDi) social networks, those networks must first be consolidated into a single network. Two challenges that arise when consolidating MuDi networks are their heterogeneity, due to different name representation techniques used for participants, and the variability of trust information, due to the different trust evaluation criteria, across the different candidate networks. Semantic technologies are vital to deal with the heterogeneity issues as they permit data to be linked from multiple resources and help them to be modelled in a uniform representation using ontologies. The inconsistency of multiple trust values from different networks is handled using data fusion techniques, as simpler aggregation techniques of summation and weighted averages tend to distort trust data. To test the proposed semantic framework, two set of experiments were run. Simulation experiments generated pairs of networks with varying percentages of Participant Overlap (PO) and Tie Overlap (TO), with trust values added to the links between participants in the networks. It analysed different data fusion techniques aiming to identify which best preserved the integrity of trust from each individual network with varying values of PO and TO. A real world experiment used the findings of the simulation experiment on the best trust aggregation techniques and applied the framework to real trust data between participants that was extracted from a pair of professional social networks. The trust values generated from consolidated MuDi networks were then compared with the real life trust between users, collected using a survey, with the aim of analysing whether aggregated trust is closer to real life trust than using each of the individual networks. Analysis of the simulation experiment showed that the Weighted Ordered Weighted Averaging (WOWA) data fusion technique better aggregated trust data and, unlike the other techniques, preserved the integrity of trust from each individual network for varying PO and TO (p � 0.05). The real world experiment partially proved the hypothesis of generating better trust values from consolidated MuDi networks and showed improved results for participants who are part of both networks (p � 0.05), while disproving the claim for those in the cross-region (with one user present in both networks and the other in a single network) and single-network users (p > 0.05).
APA, Harvard, Vancouver, ISO, and other styles
22

Jun, Seung Won. "Building Robust Peer-to-Peer Information Dissemination Systems Using Trust and Incentives." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14037.

Full text
Abstract:
As computers become pervasive and better connected, the popularity of peer-to-peer computing has grown immensely. The sharing of unused resources at peers is desirable and practically important because they can collectively comprise a powerful system. The potential benefit, however, can be undermined by uncooperative behavior of some peers because they are managed individually and hence may not follow the expected protocols. To build robust systems, we must incorporate proper trust and incentive mechanisms so that peers would rather cooperate. In this dissertation, we demonstrate that building robust peer-to-peer information dissemination systems is important and viable, using four concrete cases. First, we investigate the incentive mechanism of BitTorrent, an exchange-based file distribution protocol. Our framework based on iterated prisoner's dilemma provides an insight into users' tension between eagerness to download and unwillingness to upload. By using both analytical and experimental approaches, we show that the current incentive mechanism of BitTorrent is susceptible to free riding. We propose an improved mechanism that punishes free riders effectively. Second, we present a trust-aware overlay multicast system that performs well in the presence of uncooperative nodes, which may block, delay, fabricate, or forge the messages they forward. We develop (1) a set of protocols that detect uncooperative behavior, (2) a scheme of trust value assignment according to the behavior of nodes, and (3) an algorithm that adapts the multicast tree based on trust values, all of which allows the system to remain stable and responsive over time. Third, we propose an alternative news feed dissemination system, called FeedEx, in which feed subscribers mesh into a network and exchange news feeds with neighbors. The collaborative exchange in FeedEx, with the help of the incentive-compatible design using the pair-wise fairness principle, reduces the server load and hence increases the scalability. Fourth, we introduce a new concept of peer-to-peer computing, that is, continual service using ephemeral servers. To this end, we develop a system model for the concept and implement a discrete-time simulator to find the conditions and the system support for eliciting cooperation. All four cases are substantiated by experimental results.
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Galby, Mohamed, and Madani Arezou. "Hardware Root of Trust for Linux Based Edge Gateway." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-18846.

Full text
Abstract:
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. Many researches and studies have been conducted to alleviate such a problem. One of the solutions can be achieved by building a root of trust based on a hardware module such as Trusted Platform Module (TPM) or software like Trusted Execution Environment (TEE). In this work, we provide a solution to the problem by enabling Hardware Root of Trust (HRoT) using TPM on a product from HMS Industrial Network AB known as GWen board, a Linux-based embedded system, used as gateway to connect IoT devices. We describe a method that uses the processor of the GWen (i.e. Zynq-7020 FPGA SoC) to enable secure boot. Besides, we provide a method to enable the TPM chip mounted on the GWen (i.e. SLB 9670 TPM 2.0) using TPM Software Stack TSS 2.0. We demonstrated, in detail, various use-cases using the TPM on GWen including cryptographic keys generation, secure key storage and key usage for different cryptographic operations. Furthermore, we conducted an analysis to the adopted solution by inspecting the latency of TPM commands on the GWen gateway. According to the high restrictions of TPM 2.0 specifications and based on our results, adding the TPM 2.0 to the IoT gateway GWen will enhance the security of its Linux distribution and will makes it possible to securely identify and authenticate the gateway on the network based on its secret keys that are stored securely inside its TPM.
APA, Harvard, Vancouver, ISO, and other styles
24

Alghamedy, Fatemah. "ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH AUXILIARY INFORMATION IMPUTATION." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/79.

Full text
Abstract:
This dissertation studies the factors that negatively impact the accuracy of the collaborative filtering recommendation systems based on nonnegative matrix factorization (NMF). The keystone in the recommendation system is the rating that expresses the user's opinion about an item. One of the most significant issues in the recommendation systems is the lack of ratings. This issue is called "cold-start" issue, which appears clearly with New-Users who did not rate any item and New-Items, which did not receive any rating. The traditional recommendation systems assume that users are independent and identically distributed and ignore the connections among users whereas the recommendation actually is a social activity. This dissertation aims to enhance NMF-based recommendation systems by utilizing the imputation method and limiting the errors that are introduced in the system. External information such as trust network and item categories are incorporated into NMF-based recommendation systems through the imputation. The proposed approaches impute various subsets of the missing ratings. The subsets are defined based on the total number of the ratings of the user or item before the imputation, such as impute the missing ratings of New-Users, New-Items, or cold-start users or items that suffer from the lack of the ratings. In addition, several factors are analyzed that affect the prediction accuracy when the imputation method is utilized with NMF-based recommendation systems. These factors include the total number of the ratings of the user or item before the imputation, the total number of imputed ratings for each user and item, the average of imputed rating values, and the value of imputed rating values. In addition, several strategies are applied to select the subset of missing ratings for the imputation that lead to increasing the prediction accuracy and limiting the imputation error. Moreover, a comparison is conducted with some popular methods that are in common with the proposed method in utilizing the imputation to handle the lack of ratings, but they differ in the source of the imputed ratings. Experiments on different large-size datasets are conducted to examine the proposed approaches and analyze the effects of the imputation on accuracy. Users and items are divided into three groups based on the total number of the ratings before the imputation is applied and their recommendation accuracy is calculated. The results show that the imputation enhances the recommendation system by capacitating the system to recommend items to New-Users, introduce New-Items to users, and increase the accuracy of the cold-start users and items. However, the analyzed factors play important roles in the recommendation accuracy and limit the error that is introduced from the imputation.
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Ally. "An Empirical Investigation of the Role of Information Quality in Citizens' Trust in E-government Systems." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/210.

Full text
Abstract:
Over the past decade, there has been a change in the citizen–government relationship. Citizens have moved from a traditional face–to–face communication with their government, to an electronic interaction through the use of e–government systems. Emerging technology has enabled citizens to communicate with their government remotely. However, trust in e–government systems has been a problem. E–government systems lack personal interaction, and this creates resistance and uncertainty. Citizens also have a concern about turning over information to the government due to the concern that the information could be used to harm them. This predictive study was designed to determine citizens’ trust in e–government systems. In Phase one, a key list of e–government’s information quality (IQ) characteristics was developed through literature research, and via an open–ended questionnaire delivered to a focus group of about 20 citizens. After the first phase, key IQ factors that affect trust in e–government systems were determined using Keeney’s approach. IQ characteristics collected from the open–ended questionnaire in the first phase were grouped based on their similarities and categorized based on the four IQ categories proposed by Y. W. Lee (1997). In Phase two, 363 citizens were surveyed via the Internet to determine their level of trust in e–government systems. Exploratory factor analysis (EFA) via principal component analysis (PCA) was used to determine the key IQ factors that affect citizens’ trust in e–government systems. A theoretical model was proposed, and the ordinal logistic regression (OLR) statistical method was used to formulate model and test predictive power. OLR developed the predictive model using IQ factors as the independent variables and trust as the dependent variables. OLR helped determine the relative weight of each of the IQ factors when predicting user’s trust in e–government systems. Based on the results, the three IQ factors: accuracy/dependability, accessibility/completeness, and representational were confirmed to have positive weights on citizens’ trust in e–government systems. Additionally, results demonstrated that two factors – –accessibility/completeness and representational had a significant contribution to trust. Accuracy/dependability showed a positive weight on the dependent variable, trust, but was not a significant contributor to trust. Results from the Mann–Whitney U Test determined that there were no significant differences between males and females on trust in e–government systems. The study makes two important contributions to the Information Systems body of knowledge. First, it investigated the IQ factors that citizens feel are important in e–government systems. IQ is important for information systems success. IQ in e–government systems is important for persuading citizens to trust e–government systems. Second, it investigated key IQ factors contributing to citizens’ trust in e–government systems. Trust in the IQ of e–government systems is crucial to the success of such Web–based technology due to its involvement with most citizenry as users.
APA, Harvard, Vancouver, ISO, and other styles
26

Lennerholt, Christian. "Achieving Trust in IT Outsourcing Relationships." Thesis, University of Skövde, School of Humanities and Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18.

Full text
Abstract:

IT outsourcing is a hot topic in today’s demanding environment. Many organizations start to outsource information technology in order to achieve benefits such as cost reduction, improve quality of service, and focus on the core competence. However, IT outsourcing projects are not an easy task to manage and many projects fail even though there exists a lot of research within the area. In order to increase the possibility to achieve project success, today’s literature indicates that trust is an important factor to achieve. This thesis aim is to identify and describe the process of how to achieve trust in IT outsourcing relationships. The methodology is a literature study as its purpose is to cover the aspects of trust and how the literature proposes how to achieve trust in IT outsourcing relationships.

Relevant literature has been identified, analyzed, and categorized in order to define the thesis concepts and to create a framework based on critical success factors of how to achieve trust in IT outsourcing relationships. The framework can be used as a guiding principle of how organizations can achieve trust in IT outsourcing relationships to increases the possibility to achieve project success. The framework can also raise the awareness that makes it possible to deal with different IT outsourcing situations.

APA, Harvard, Vancouver, ISO, and other styles
27

Taqieddin, Eyad Salah. "Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/dissertation_09007dcc8033e18a.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed October 25, 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
28

Althuru, Dharan Kumar Reddy. "Distributed Local Trust Propagation Model and its Cloud-based Implementation." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1400649603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Reid, Michael Hubert. "Integrating Trust and Computer Self-Efficacy into the Technology Acceptance Model: Their Impact on Customers' Use of Banking Information Systems in Jamaica." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/283.

Full text
Abstract:
In recent times, there has been a rapid increase in technological initiatives to promote electronic commerce. Delivery of services via the Internet or other remote computing technology now represents the trend for most organizations. In keeping with market trends, the banking industry in Jamaica and other countries worldwide have also adapted a variety of technological initiatives to enhance the delivery of services to remote customers. As these trends continue, there is heightened interest in information systems (IS) research to understand the factors that motivate or encourage individuals to use these technologies. This situation exists because interactions in these environments are significantly different from the traditional face to face settings. The original Technology Acceptance Model (TAM) has long been studied, modified, and extended by IS researchers as a classical model for understanding individual's intention to use (IU) an IS. According to TAM, IU an IS is based on two constructs: perceived ease of use (PEOU) and perceived usefulness (PU). Researchers have identified other factors such as trust (TRST) and computer self-efficacy (CSE) that impact an individual's IU an IS. In this predictive study, the researcher examined the integration of TRST and CSE into TAM and their overall impact on customers' intentions to use banking information systems (BIS) in Jamaica. A 32-item Web-based survey instrument was used to collect data from 374 customers of three major banks in Jamaica. A revised TAM model was proposed and SPSS's AMOS 7.0 statistical package was used to perform data analysis and model fit testing based on structural equation modeling (SEM). Results showed that while CSE did not significantly predict TRST and PEOU, it significantly predicted PU. Additionally, TRST significantly predicted both PEOU and PU, and PEOU positively predicted PU and attitude (ATT) towards BIS. Furthermore, PU was a significant predictor of ATT and IU, and ATT significantly impacted IU. The findings also revealed that only TRST varied significantly across males and females and the original TAM had a slightly better fit than the revised TAM. The research laid the foundation for future exploratory studies of TAM in specialized contexts such as BIS in Jamaica.
APA, Harvard, Vancouver, ISO, and other styles
30

Larsson, Göran. "Integrating Ethical Considerations in Computerized Information Systems." Thesis, University of Skövde, Department of Computer Science, 1999. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-401.

Full text
Abstract:

This work concerns ethics applied to computer technology, emphasizing the use of this technology within organizations. Computer technology has created the possibility to do things not possible before, for good and bad. Ethical reasoning can be used as a tool to provide guidance, in order to create Computerized Information Systems (CIS) that are sustainable with respect to the ethical demands that can be put upon them.

If one wants to integrate ethical considerations into a CIS, it is reasonable that ethical issues should be taken account of in systems development. As a general methodology for developing a CIS, the Systems Development Life Cycle (SDLC) will be examined. The SDLC is the place and moment when it is possible to integrate ethical considerations into a CIS.

This work will focus on, and try to explain, what characteristics are necessary in order to be able to apply ethical considerations to a methodology. This is done by examining five methodologies adopting the SDLC. It will also be examined how the three major ethical theories utilitarianism, deontologism and rights ethics will affect the SDLC, and thus eventually a CIS being implemented.

The outcome of this work are that there are limited possibilities of integrating ethical considerations into methodologies adopting a hard system approach, compared to those adopting a soft one. The ethical standards of a CIS must be established early on in the SDLC. Integration of ethical issues requires a system approach to be applied in the SDLC. Participation becomes an important feature of systems development in order to adopt ethical reasoning. The different ethical theories will put different emphasis on the group or the individual in systems development.

APA, Harvard, Vancouver, ISO, and other styles
31

Haviland, Hannah. ""The Machine Made Me Do It!" : An Exploration of Ascribing Agency and Responsibility to Decision Support Systems." Thesis, Linköping University, Centre for Applied Ethics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2922.

Full text
Abstract:

Are agency and responsibility solely ascribable to humans? The advent of artificial intelligence (AI), including the development of so-called “affective computing,” appears to be chipping away at the traditional building blocks of moral agency and responsibility. Spurred by the realization that fully autonomous, self-aware, even rational and emotionally-intelligent computer systems may emerge in the future, professionals in engineering and computer science have historically been the most vocal to warn of the ways in which such systems may alter our understanding of computer ethics. Despite the increasing attention of many philosophers and ethicists to the development of AI, there continues to exist a fair amount of conceptual muddiness on the conditions for assigning agency and responsibility to such systems, from both an ethical and a legal perspective. Moral and legal philosophies may overlap to a high degree, but are neither interchangeable nor identical. This paper attempts to clarify the actual and hypothetical ethical and legal situations governing a very particular type of advanced, or “intelligent,” computer system: medical decision support systems (MDSS) that feature AI in their system design. While it is well-recognized that MDSS can be categorized by type and function, further categorization of their mediating effects on users and patients is needed in order to even begin ascribing some level of moral or legal responsibility. I conclude that various doctrines of Anglo legal systems appear to allow for the possibility of assigning specific types of agency – and thus specific types of legal responsibility – to some types of MDSS. Strong arguments for assigning moral agency and responsibility are still lacking, however.

APA, Harvard, Vancouver, ISO, and other styles
32

Wells, Raymond Cleophas. "An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The Bahamas." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/335.

Full text
Abstract:
Researchers have found that software piracy worldwide over the years has significantly contributed to billions of dollars in lost revenue for many software firms. Software developers have found it difficult to create software that is not easily copied, thus, creating a software protection problem. Software piracy remains a global problem despite the significant effort to combat its prevalence. Over the years, significant research has attempted to determine the factors that contribute to individuals' propensity to commit software piracy. Most of the research on software piracy has been limited to larger societies, with recommendations by researchers to extend similar studies to smaller ones. The literature indicating the need for additional research on this topic in different populations and cultures is significant. Given that, the key contributions of this study were to assess empirically factors such as personal moral obligation (PMO), cultural dimensions, ethical computer self-efficacy (ECSE) and the effect it has on individuals' propensity -- in cultures that support it -- to commit software piracy in smaller geographical locations. Therefore, this research empirically assessed the contribution that PMO, Hofstede's cultural dimension of individualism/collectivism (I/C), and ECSE have made on individuals' propensity to commit software piracy. The study extended the current body of knowledge by finding answers to three specific questions. First, this study sought to determine whether the PMO component contributed to individuals' propensity to commit software piracy in The Bahamas. Secondly, this study sought to determine the level of contribution of Hofstede's cultural dimension of I/C to individuals' propensity to commit software piracy in The Bahamas. Finally, this study sought to determine the contribution of ECSE to individuals' propensity to commit software piracy in The Bahamas. A total of 321 usable responses were collected over a one-month period from students from the school of business at a small Bahamian college, to determine their level of PMO, I/C, and ECSE contribution to individuals' propensity to commit software piracy. This represents, approximately, a 64% response rate. The results showed the overall significance of the models of the three factors in predicting individuals' propensity to commit software piracy. Furthermore, the results indicated that PMO and ECSE subscale PMO and ECSE_DB were significant, however, I/C, and ECSE (as a whole) were not.
APA, Harvard, Vancouver, ISO, and other styles
33

Wagner, Alan Richard. "The role of trust and relationships in human-robot social interaction." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31776.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010.
Committee Chair: Arkin, Ronald C.; Committee Member: Christensen, Henrik I.; Committee Member: Fisk, Arthur D.; Committee Member: Ram, Ashwin; Committee Member: Thomaz, Andrea. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
34

Helldin, Tove. "Transparency for future semi-automated systems : effects of transparency on operator performance, workload and trust." Doctoral thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-34619.

Full text
Abstract:
More and more complex semi-automated systems are being developed, aiding human operators to collect and analyze data and information and even to recommend decisions and act upon these. The goal of such development is often to support the operators make better decisions faster, while at the same time decrease their workload. However, these promises are not always fulfilled and several incidents have highlighted the fact that the introduction of automated technologies might instead increase the need for human involvement andexpertise in the tasks carried out. The significance of communicating information regarding an automated system's performance and to explain its strengths and limitations to its operators is strongly highlighted within the system transparencyand operator-centered automation literature. However, it is not common that feedback containing system qualifiers is incorporated into the primary displays of the automated system, obscuring its transparency. In this thesis, we deal with the investigation of the effects of explaining and visualizing system reasoning and performance parameters in different domains on the operators' trust, workload and performance. Different proof-of-concept prototypes have been designed with transparency characteristics in mind, and quantitative and qualitative evaluations together with operators of these systems have been carried out. Our results show that the effects of automation transparency can positively influence the performance and trust calibration of operators of complex systems, yet possibly at the costs of higher workload and longer decision-making times. Further, this thesis provides recommendations for designers and developers of automated systems in terms of general design concepts and guidelines for developing transparent automated systems for the future.
Fler och fler komplexa semiautomatiserade system utvecklas idag, vilka hjälper operatörer att samla in och analysera data och information och även att rekommendera beslut och agera på dessa. Det yttersta målet med implementeringen av automatiserade system är ofta att hjälpa operatörerna att fatta bättre beslut snabbare och samtidigt minska deras arbetsbelastning. Dock blir detta inte alltid fallet och flera olyckor har uppmärksammat faktumet att introduktionen av automatiserade system istället kan öka behovet av mänsklig inblandning och expertis. Inom forskningsområden såsom automationstransparens och operatörscentrerad automation har vikten av att kommunicera information angående automationens prestanda betonats, likaså att förklara dess styrkor och svagheter för operatörerna. Dock är det inte vanligt att sådan meta-information inkorporeras i de automatiska systemens primära användargränssnitt, vilket kan försvåra det för operatörerna att tillgodogöra sig denna information. I denna avhandling undersöks effekterna av att förklara och visualisera semiautomatiserade systems resonerande och prestanda i olika domäner på operatörernas tillit till systemen, deras upplevda arbetsbörda och deras prestation. Olika konceptprototyper har designats med inkorporerade transparensegenskaper och kvalitativa och kvantitativa utvärderingar tillsammans med operatörer av dessa system har genomförts. Resultaten visar att automationstransparens kan ha positiva effekter på operatörers prestanda och tillitskalibrering, dock med möjliga kostnader i form av högre upplevd arbetsbelastning och längre beslutstider. Avhandlingen erbjuder även rekommendationer till designers och utvecklare i form av generella riktlinjer och designegenskaper vid utvecklandet av framtida transparenta semiautomatiserade stödsystem.

The author is also affiliated to the university of Skövde

This research has been founded by The Swedish Governmental Agency for InnovationSystems (Vinnova) through the National Aviation Engineering Research Program(NFFP5-2009-01315) and supported by Saab AB.

APA, Harvard, Vancouver, ISO, and other styles
35

Sahinkaya, Ferhat. "A Content Boosted Collaborative Filtering Approach For Recommender Systems Based On Multi Level And Bidirectional Trust Data." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612013/index.pdf.

Full text
Abstract:
As the Internet became widespread all over the world, people started to share great amount of data on the web and almost every people joined different data networks in order to have a quick access to data shared among people and survive against the information overload on the web. Recommender systems are created to provide users more personalized information services and to make data available for people without an extra effort. Most of these systems aim to get or learn user preferences, explicitly or implicitly depending to the system, and guess &ldquo
preferable data&rdquo
that has not already been consumed by the user. Traditional approaches use user/item similarity or item content information to filter items for the active user
however most of the recent approaches also consider the trustworthiness of users. By using trustworthiness, only reliable users according to the target user opinion will be considered during information retrieval. Within this thesis work, a content boosted method of using trust data in recommender systems is proposed. It is aimed to be shown that people who trust the active user and the people, whom the active user trusts, also have correlated opinions with the active user. This results the fact that the rated items by these people can also be used while offering new items to users. For this research, www.epinions.com site is crawled, in order to access user trust relationships, product content information and review ratings which are ratings given by users to product reviews that are written by other users.
APA, Harvard, Vancouver, ISO, and other styles
36

Raj, Himanshu. "Virtualization services scalable methods for virtualizing multicore systems /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22677.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008.
Committee Chair: Schwan, Karsten; Committee Member: Ahamad, Mustaq; Committee Member: Fujimoto, Richard; Committee Member: Gavrilovska, Ada; Committee Member: Owen, Henry; Committee Member: Xenidis, Jimi.
APA, Harvard, Vancouver, ISO, and other styles
37

Edwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.

Full text
Abstract:
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant interest in the recent past on how human compliance to information security policy can be achieved in an organization. Various models have been proposed by these researchers. However, there are very few models that have tried to link human commitment attributes with information security governance of an organization. The research problem of this study was to identify the security controls and mechanisms to govern information security effectively. The proposed model was based on agency theory and comprises a relationship between human commitment variables (ethics, integrity and trust) with security governance variables (structural, relational and process) referred as systemic variables in the research. The resulting correlation is further related with governance objectives (goal congruence and reducing information asymmetry) to hypothesize an effective information security in an organization. The research model proposed was tested employing confirmatory factor analysis (CFA) and structural equation modeling (SEM). There were four models tested in this research. The first model (initial measurement model) comprised human variables linked with relational and the systemic variables linked with goal congruence and information asymmetry. This model could not get through the CFA tests. A modified model comprising human and systemic attributes related with goal congruence and information asymmetry, separately, was taken forward to SEM. This model returned low model fitment scores and hence two alternate models were tested. In the first alternative, the human attributes were related with goal congruence and systemic attributes were linked with information asymmetry. In the second alternative, the relationships of the first alternatives were retained and two alternate relationships were introduced - integrity was linked with information asymmetry and structural was linked with goal congruence. Both models are very close to good model fitment scores. However, the second alternative returned better results and hence, was chosen as the final outcome of the research. The model reflects that human attributes and systemic attributes are fairly independent in an effective information security framework, and drive goal congruence and information asymmetry, respectively. However, integrity is an important human commitment for ensuring information asymmetry and the right organizational structure and roles are important for ensuring goal congruence.
APA, Harvard, Vancouver, ISO, and other styles
38

Vijay, Nishanth. "Detection of plant diseases in tomato leaves : With focus on providing explainability and evaluating user trust." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20568.

Full text
Abstract:
The transmission of diseases from unhealthy to healthy plants is one of the most disastrous threats to the agriculture industry. Diseases transferred spread like wild fire and have the potential to infest the whole farm if not detected early. Plant disease detection methods aid in identifying infected plants in their very early stages and also help the user in scaling the identification of plant diseases to a variety of plants in a cost-effective manner. The aim of this thesis is to implement two different machine learning models, namely, Convolution Neural Networks (CNN) and K-nearest Neighbors (KNN) for the application of plant disease detection in tomato leaves.The two machine learning models were evaluated on four different metrics in order to find the best performing model among the two. The four different metrics were, Accuracy, Precision, Recall and F1-Score. Other than identifying the diseases using the aforementioned machine learning models, this study also focused on providing explainability to the predictions made by the respective models using the Explainable Artificial Intelligence technique, Local Interpretable Model-agnostic Explanations (LIME). In vein of collecting domain specific expertise, a user study was implemented in which the user trust of the AI and XAI models were evaluated and feedback from farmers were collected in order to provide recommendations for future research.The results on implementing the machine learning models showed that the CNN model performed better than the KNN model in all of the four evaluation metrics and the results from the user study signify that the farmers do not trust the AI and XAI models, however, the user study through the feedback collected from the farmers helps identify areas in which the trust of the farmers can be grown and strengthened.
APA, Harvard, Vancouver, ISO, and other styles
39

Van, Sophie. "Encouraging moral reflection in digital games : Feedback systems and their effects." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-12542.

Full text
Abstract:
The aim of this study is to investigate whether some feedback systems are better at encouraging moral reflection than other in digital games. A small game was developed, which was then made into three versions, each with different feedback systems. A total of 35 people participated in the study. The results indicate that color coding the game’s options decrease the moral reflection, while some feedback in form more ambiguous text is still positively perceived.
APA, Harvard, Vancouver, ISO, and other styles
40

Ercan, Eda. "Probabilistic Matrix Factorization Based Collaborative Filtering With Implicit Trust Derived From Review Ratings Information." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612529/index.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chanko, Elisabeth. "Factors that influence users' perceptions of trust in e-commerce." Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-888.

Full text
Abstract:

The popularity of personal computers and recent advances in Internet technology has provided companies with a new medium for selling their products and increasing their customer base. Due to the influx and acceptance of these new possibilities for both users and businesses, all the more organizations are choosing to exploit electronic commerce. This concept is nothing new or novel, but over the years recent development in the domain of e-commerce has increased tremendously and it has become more commonplace and viable as a solution for customers to easily and effectively shop for products and services. One reason for users not to do an online purchase is feelings of uncertainty and dependency on the unknown, but more importantly a lack of trust for the vendor and the technology involved in the transaction. The focus of this report is on aspects of user trust in business-to-consumer e-commerce and how specific factors of e-commerce, i.e., usability, web site design, security, transference and privacy, influence user trust in e-businesses.

Eleven respondents who had some experience in e-commerce purchases were interviewed using open-ended questions to find out how they perceived trust in general and how certain factors influence their perception of trust in e-commerce. The results of this study show that usability, web site design, security, and transference and privacy, directly influence user trust in e-businesses since these factors lie closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase.

APA, Harvard, Vancouver, ISO, and other styles
42

Vance, Anthony Osborn. "Trusting IT Artifacts: How Trust Affects our Use of Technology." unrestricted, 2009. http://etd.gsu.edu/theses/available/etd-04292009-142512/.

Full text
Abstract:
Thesis (Ph. D.)--Georgia State University, 2009.
Title from file title page. Detmar W. Straub, committee chair; Mikko Siponen, A. Faye Borthick, Arun Rai, Michel Kalika, committee members. Description based on contents viewed July 14, 2009. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
43

Hambly, Robert. "An Empirical Investigation of the Willingness of US Intelligence Community Analysts to Contribute Knowledge to a Knowledge Management System (KMS) in a Highly Classified and Sensitive Environment." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/991.

Full text
Abstract:
Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information technology-based knowledge management system (KMS). The main goal of this study was to empirically assess a model testing the impact of the factors of rewards, power, centrality, trust, collaborative environment, resistance to share, ease-of-using KMS, organizational structure, and top management support to inducement, willingness to share, as well as opportunity to contribute knowledge to a KMS on knowledge-sharing in a highly classified and sensitive environment of the USG IC. This study capitalized on prior literature to measure each of the 15 model constructs. This study was conducted with a select group of USG Departments and Agencies whose primary interest is Intelligence Operations. This study solicited responses from more than 1,000 current, as well as former, Intelligence Analysts of the USG IC, using an unclassified anonymous survey instrument. A total of 525 (52.5%) valid responses were analyzed using a partial least squares (PLS) structural equation modeling (SEM) statistical technique to perform model testing. Pre-analysis data screening was conducted to ensure the accuracy of the data collected, as well as to correct irregularities or errors within the gathered data. The 14 propositions outlined in this research study were tested using the PLS-SEM analysis along with reliability and validity checks. The results of this study provide insights into the key factors that shed light onto the willingness of US intelligence community analysts to contribute knowledge to a KMS in a highly classified and sensitive environment. Specifically, the significance of a knowledge worker’s willingness to contribute his/her knowledge to a KMS along with the opportunity to contribute knowledge, while inducement was not a significant factor when it comes to knowledge sharing using KMS in highly classified environments.
APA, Harvard, Vancouver, ISO, and other styles
44

Campano, Erik. "Online Shaming : Ethical Tools for Human-Computer Interaction Designers." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-172899.

Full text
Abstract:
A set of tools – concepts, guidelines, and engineering solutions – are proposed to help human-computer interaction designers build systems that are ethical with regards to online shaming. Online shaming’s ethics are unsolved in the literature, and the phenomenon can have devastating consequences, as well as serve social justice. Kantian ethics, as interpreted by Christine Korsgaard, provide our analytical methodology. Her meta-ethics invokes Wittgenstein’s private language argument, which also models relevant concepts in human-computer interaction theory. Empirical studies and other ethicists’ views on online shaming are presented. Korsgaard’s Kantian methodology is used to evaluate the other ethicists’ views’ moral acceptability, and guidelines are drawn from that analysis. These guidelines permit shaming, with strong constraints. Technical engineering solutions to ethical problems in online shaming are discussed. All these results are situated in the public dialogue on online shaming, and future research from other ethical traditions is suggested.
APA, Harvard, Vancouver, ISO, and other styles
45

Westergren, Ulrika H. "Disentangling sociomateriality : an exploration of remote monitoring systems in interorganizational networks." Doctoral thesis, Umeå universitet, Institutionen för informatik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-43488.

Full text
Abstract:
Firmly placed in an industrial setting, this research explored the introduction of remote monitoring technology into three different organizational contexts. By following these organizations over time, starting with their intention to invest in remote monitoring systems (RMS), there was a unique opportunity to witness their processes and to gain an insight into the intricacies of information technology (IT) and organizational transformation. The main question that this research sought to answer was thus: How is IT implicated in the remote monitoring of industrial equipment? Previous information systems research has been accused of not paying enough attention to the material, that is, of not being specific about technology. This research adopted a sociomaterial perspective, thus recognizing the constitutive entanglement of the material and the social, and thereby acknowledging their mutual dependency. However, in order to provide specific insights about the material, an analytical disentanglement was performed, by extending the concept of agency from a focus on “the what” to include “the how”. Change was thus studied by not only asking what the nature of change is and who or what causes change to occur, but by also tracing how change is enacted, thus capturing both material and social agency as well as tracing their entanglement. This research employed a broad approach, designed to provide a profound and extensive account of the studied phenomenon. Consequently, the thesis explored value creation, sourcing routines, partnership formation and innovative practices all related to remote diagnostics design and use. In addition, the research was qualitative and used interpretive case studies as the main methodology. A composite finding of this research is that an RMS, with its ability to collect, transmit, store, and analyze specific contextual information across time and space, provides opportunities for boundary-spanning activities manifested as the formation of interorganizational networks. Furthermore, by tracing the information capabilities of the IT, and by being specific about the material, it has been possible to explore how RMSs have the potential to influence both organizational form and content. Through the examination of RMSs within interorganizational networks and as a part of value creation practices, this research has also shown how the organizational form and content have the potential to influence RMSs; their design, use, and material affordances. This research also placed focus on the importance of trust and has shown that trust in technology is established through trust in people.
APA, Harvard, Vancouver, ISO, and other styles
46

Gray, John Max. "Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/364.

Full text
Abstract:
Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s character strengths have been linked to positive personal development, but there has been very little research into how the positive characteristics of virtue ethics, exhibited through the character development of information systems workers, can contribute to improving system security. This research aimed to address this gap by examining factors that affect and shape the ethical perspectives of individuals entrusted with privileged access to information. This study builds upon prior research and theoretical frameworks on institutionalizing ethics into organizations and Information Ethics to propose a new theoretical model which demonstrates the influences on Information Systems Security (ISS) trusted worker ethical behavior within an organization. Components of the research model include ISS virtue ethics based constructs, organizational based internal influences, societal based external influences, and trusted worker ethical behavior. This study used data collected from 395 professionals in an ISS organization to empirically assess the model. Partial Least Squares Structural Equation Modeling was employed to analyze the indicators, constructs, and path relationships. Various statistical tests determined validity and reliability, with mixed but adequate results. All of the relationships between constructs were positive, although some were stronger and more significant. The expectation of the researcher in this study was to better understand the character of individuals who pose an insider threat by validating the proposed model, thereby providing a conceptual analysis of the character traits which influence the ethical behavior of trusted workers and ultimately information system security.
APA, Harvard, Vancouver, ISO, and other styles
47

McCullagh, Adrian J. "The incorporation of trust strategies in digital signature regimes." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Pethrus, Anton. "Informationens effekt i moraliska dilemman : Effekterna mängden tillgänglig information har på spelares beslut i prohibition dilemman." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13734.

Full text
Abstract:
Detta arbete redogör för effekterna tillgången eller avsaknaden av omfattande karaktärsinformation samt information om beslutens direkta konsekvenser har på spelarens beslutsprocess i narrativa prohibition dilemman. Då det finns avsaknad av konsensus om dess effekter i ämnesområdet och en frånvaro av objektiva studier för att undersöka de aktuella ståndpunkterna, är studien nödvändig för att förbättra kunskapen inom området och för att generera objektiva resultat av dess effekter på spelare. För att undersöka problemformuleringen skapades två likadana textbaserade spel, där skillnaden mellan dem var att den ena gav spelaren omfattande karaktärsinformation och information om beslutens direkta konsekvenser i spelet narrativa prohibition dilemman, medan den andra artefakten saknade den informationen. Respektive artefakt testades på en separat testgrupp för att generera resultat om dess respektive effekt på testgruppen som spelade den. Resultaten var blandade i de olika testgrupperna. Det gick dock att finna tendenser i resultaten i de olika grupperna. När spelare inte hade omfattande karaktärsinformation samt information om beslutens konsekvenser, var de mer benägna att välja de beslut de kände var rätt utifrån deras egna värderingar när de inte kunde härleda beslutens konsekvenser. När de kunde härleda beslutens konsekvenser valde de ofta det val vilket gav dem den mest fördelaktiga utkomsten. När spelaren hade tillgång omfattande karaktärsinformation samt information om beslutens direkta konsekvenser motiverades deras beslut av att väga fördelarna och nackdelarna av respektive beslutsalternativ mot varandra, utifrån en strategisk och/eller moralisk basis, där de tog det alternativ som gav dem den mest optimala utkomsten. I fall där spelarna hade en emotionell investering i besluten valde de oftast oavsett mängden tillgänglig information vid beslutet att välja det beslut som kändes rätt. Något som även framkom i studien var att bättre resultat för att besvara problemformuleringen och explorativt undersöka ämnesområdet, skulle vara att göra ett liknande test av artefakterna på grupper av definierade spelartyper. Det skulle ge en bättre översikt av respektive utgångspunkts påverkan på specifika spelartyper och generera tydligare samt mer användbara resultat att besvara problemformuleringen med.
APA, Harvard, Vancouver, ISO, and other styles
49

Radhakrishnan, Rahul Lal. "A Method to Improve the Security of Information Diffusion in Complex Networks— Node Trust Value Management Mechanism." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42447.

Full text
Abstract:
In a sensing field-based placement of nodes the communication happens from the data acquisition points to the control center which is the receiver of data acquisition. In this project an algorithm based on data sense points trust value updating is used which will find out the value of the trust level dynamically once the trust level is found out it will pick the forwarded data sense points based on highest value of trust. The NTTUA algorithm is then compared with baysian trust method and then pick the path which has the highest baysian trust. The comparison between NTTUA and baysian method is done with respect to multiple parameters which give good performance and better residual energy along with throughput
APA, Harvard, Vancouver, ISO, and other styles
50

Mohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.

Full text
Abstract:
The proposed research is in the area of attribute-based authorization systems. We address two specific research problems in this area. First, evaluating authorization policies in multi-authority systems where there are multiple stakeholders in the disclosure of sensitive data. The research proposes to consider all the relevant policies related to authorization in real time upon the receipt of an access request and to resolve any differences that these individual policies may have in authorization. Second, to enable a lot of entities to participate in the authorization process by asserting attributes on behalf of the principal accessing resources. Since it is required that these asserted attributes be trusted by the authorization system, it is necessary that these entities are themselves trusted by the authorization system. Two frameworks are proposed to address these issues. In the first contribution a dynamic authorization system is proposed which provides conflict detection and resolution among applicable policies in a multi-authority system. The authorization system is dynamic in nature and considers the context of an access request to adapt its policy selection, execution and conflict handling based on the access environment. Efficient indexing techniques are used to increase the speed of authorization policy loading and evaluation. In the second contribution, we propose a framework for service providers to evaluate trust in entities asserting on behalf of service users in real time upon receipt of an access request. This trust evaluation is done based on a reputation system model, which is designed to protect itself against known attacks on reputation systems.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography