Journal articles on the topic 'Trust and ethics of computer systems'

To see the other types of publications on this topic, follow the link: Trust and ethics of computer systems.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trust and ethics of computer systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ruotsalainen, Pekka, and Bernd Blobel. "Health Information Systems in the Digital Health Ecosystem—Problems and Solutions for Ethics, Trust and Privacy." International Journal of Environmental Research and Public Health 17, no. 9 (April 26, 2020): 3006. http://dx.doi.org/10.3390/ijerph17093006.

Full text
Abstract:
Digital health information systems (DHIS) are increasingly members of ecosystems, collecting, using and sharing a huge amount of personal health information (PHI), frequently without control and authorization through the data subject. From the data subject’s perspective, there is frequently no guarantee and therefore no trust that PHI is processed ethically in Digital Health Ecosystems. This results in new ethical, privacy and trust challenges to be solved. The authors’ objective is to find a combination of ethical principles, privacy and trust models, together enabling design, implementation of DHIS acting ethically, being trustworthy, and supporting the user’s privacy needs. Research published in journals, conference proceedings, and standards documents is analyzed from the viewpoint of ethics, privacy and trust. In that context, systems theory and systems engineering approaches together with heuristic analysis are deployed. The ethical model proposed is a combination of consequentialism, professional medical ethics and utilitarianism. Privacy enforcement can be facilitated by defining it as health information specific contextual intellectual property right, where a service user can express their own privacy needs using computer-understandable policies. Thereby, privacy as a dynamic, indeterminate concept, and computational trust, deploys linguistic values and fuzzy mathematics. The proposed solution, combining ethical principles, privacy as intellectual property and computational trust models, shows a new way to achieve ethically acceptable, trustworthy and privacy-enabling DHIS and Digital Health Ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
2

Zong, Jonathan, and J. Nathan Matias. "Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems." Social Media + Society 8, no. 1 (January 2022): 205630512210770. http://dx.doi.org/10.1177/20563051221077021.

Full text
Abstract:
The lack of consent or debriefing in online research has attracted widespread public distrust. How can designers create systems to earn and maintain public trust in large-scale online research? Procedural theories inform processes that enable individuals to make decisions about their participation. Substantive theories focus on the normative judgments that researchers and participants make about specific studies in context. Informed by these theories, we designed Bartleby, a system for debriefing participants and eliciting their views about studies that involved them. We evaluated this system by using it to debrief thousands of participants in a series of observational and experimental studies on Twitter and Reddit. We find that Bartleby addresses procedural concerns by creating new opportunities for study participants to exercise autonomy. We also find that participants use Bartleby to contribute to substantive, value-driven conversations about participant voice and power. We conclude with a critical reflection on the strengths and limitations of reusable software to satisfy values from both procedural and substantive ethical theories.
APA, Harvard, Vancouver, ISO, and other styles
3

Ahamed, A. F. M. Jalal, and Long Pham. "Online Retailer Reputation, Satisfaction, and Trust as Catalysts in the Consumer Perceptions of Ethics on Online Retailers and Repurchase Intention." International Journal of E-Adoption 13, no. 2 (July 2021): 1–18. http://dx.doi.org/10.4018/ijea.2021070101.

Full text
Abstract:
This research investigates the effect of consumer perceptions regarding the ethics of online retailers (CPEOR) on repurchase intention through reputation, satisfaction, and trust. The authors performed structural equation model analysis with SmartPLS on a sample of 458 responses collected from Vietnamese consumers. They found that CPEOR has a significant positive effect on reputation, satisfaction, and trust. As expected, trust and satisfaction directly predict repurchase intention; however, reputation does not directly follow this pattern. Instead, two prosocial constructs, namely trust and satisfaction, channel the effect of reputation on repurchase intention. Contrary to the conventional understanding that a favourable reputation will predict higher consumer trust, they found a negative correlation between these two factors. The managerial and theoretical contributions of the research and direction for future research are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
4

Bag, Surajit, Gautam Srivastava, Shivam Gupta, and Saito Taiga. "Diffusion of Big Data Analytics Innovation in Managing Natural Resources in the African Mining Industry." Journal of Global Information Management 30, no. 6 (September 2022): 1–21. http://dx.doi.org/10.4018/jgim.297074.

Full text
Abstract:
The study draws upon the ethical theory of organizing to elucidate the links between ethical climate antecedents, organizational practices, and consequences. We also integrated organizing vision theory to examine the influence of diffusion of big data analytics innovation on sustainable business practices. The results indicate that organizational trust has a significant positive impact on ethics training and ethics audit, which is critical to South Africa's mining industry. Furthermore, the results indicate that ethical leadership is positively related to ethics training and ethics audits. Findings show that ethics training and ethics audit is positively related to sustainable business practices. Findings indicate that the vision constructed by community members is positively related to the diffusion of big data analytics innovation. We also found that the diffusion of big data analytics innovation is positively related to sustainable business practices. Lastly, findings show that sustainable business practices are positively related to firm performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Hariguna, Taqwa, Ade Maharini Adiandari, and Athapol Ruangkanjanases. "Assessing customer intention use of mobile money application and the antecedent of perceived value, economic trust and service trust." International Journal of Web Information Systems 16, no. 3 (February 22, 2020): 331–45. http://dx.doi.org/10.1108/ijwis-12-2019-0055.

Full text
Abstract:
Purpose The purpose of this study is to examine the role of trust and perceived value (PV) in customer intentions to adopt mobile money application (MMA) services. Trust and PV were broken down into various dimensions. This study investigated the two-component base trusts, namely, economic and service, and also PV as an antecedent. Design/methodology/approach This study involved 402 respondents selected through the interception and online survey approach and had five hypotheses. The structural equation model was used to test the hypothesis of this study. Findings The findings showed that the PV was related to the customer’s intention to use MMA services and economy-based trust. Trust in service providers and economic-based trust were positively related to customer intentions to use MMA services. Research limitations/implications Although the concept of MMA has been explored in several literatures, the role of trust and PV in the use of MMA has not been of much concern among researchers. In addition, this study described PV as a construction with five supporting dimensions. The current literature showed that the integration of PV with construct trust was still lacking in attention from researchers especially the study of MMA. Practical implications For practitioners, these findings confirmed that MMA service providers need to convince customers of protection to money and personal information. Also, providers need to ensure that the use of MMA provides cost and time effectiveness. Besides, it is important to ensure the services provided to customers are the fastest way to carry out financial transactions, in this case, including payment and retail purchases. This finding also showed that PV related to MMA services needs to be studied from a customer perspective, focusing on four aspects of ethics, playfulness, customer return of investment and excellent service. Therefore, handling PV in these services requires specific strategies to deal with these various aspects. Originality/value This study integrated two dimensions of trust, thus economic trust and service trust, the authors also integrated dimension of PV as the antecedent of two dimensions of trust, to understand the dimension of intention use MMA.
APA, Harvard, Vancouver, ISO, and other styles
6

Hamidi, Hodjat, and Saba Moradi. "Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce." Journal of Global Information Management 25, no. 4 (October 2017): 32–45. http://dx.doi.org/10.4018/jgim.2017100103.

Full text
Abstract:
Exchanges in electronic market accomplishes through electronic channels. An electronic market is a meeting point for both the shoppers and the sellers. This article aims for the impact of cultural and security orientation on the customer perception of the seller's ethics regarding the customers' loyalty. A heuristic method is applied to examine dimensions of customer perception of seller ethics. The research community is selected out of a large group of sale experts and directly through electronic survey platform in electronic markets. According to the article findings, electronic customers are of high tendency to better understand the electronic seller's ethics, and the customer's higher perception of electronic sellers increases the shopping. On-time and correct electronic seller's responses affect positively on the customers' loyalty. The consumer loyalty regarding the ethics of electronic retailer's scale is greater completeness to evaluate consumer perceptions of e-retailers' ethics than scales using a one-dimensional approach. This study further examines both individualism and collectivism at the individual level, which is rare in the existing literature.
APA, Harvard, Vancouver, ISO, and other styles
7

Kidd, John, Frank-jürgen Richter, and Marielle Stumm. "Learning and trust in supply chain management: Disintermediation, ethics and cultural pressures in brief dynamic alliances." International Journal of Logistics Research and Applications 6, no. 4 (December 2003): 259–75. http://dx.doi.org/10.1080/13675560310001626972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Díaz Nafría, José María. "The Need for an Informational Systems Approach to Security." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 1 (March 17, 2011): 93–122. http://dx.doi.org/10.31269/vol9iss1pp93-122.

Full text
Abstract:
Different senses of security and its related assumptions, methodologies and contexts are analyzed by first reviewing the liberalistic notions of security and trust, unveiling, on the one hand, the contradictions exhibited between discourse and practice; on the other hand, the historical strategy of concentration of power behind the liberalistic doctrines. The weakness, limits and implications of the liberalistic notions and methods on security and trust are inquired, and subsequently a genuine horizon of security as sustainable and general procurement of positive freedom is advocated. The CyberSyn project successfully implemented in Chile, but tragically and prematurely ending under the hard power in the 9/11 of 1973, serves as model of the posed system approach to security. However, the system model is actualized and completed with elements of the general theory of information in virtue of: the increased complexity of societal systems, its ultimate global dimension, its biospherical closure, the increase of information assets and processes, and some epistemological boundaries. These reasons also set the need of keeping – beside the system approach – a critical and ethical stance.
APA, Harvard, Vancouver, ISO, and other styles
9

Carros, Felix, Tobias Störzinger, Anne Wierling, Adrian Preussner, and Peter Tolmie. "Ethical, Legal & Participatory Concerns in the Development of Human-Robot Interaction." i-com 21, no. 2 (July 19, 2022): 299–309. http://dx.doi.org/10.1515/icom-2022-0025.

Full text
Abstract:
Abstract Research on Human-Robot Interaction is increasing as system become widely available and reached a level that enables smooth interactions. Yet, many research projects act in a silo mentality, in regard of participatory, ethical, or legal matters of social robotics. Knowledge about specific challenges is not universal and has often to be transferred from non-robotic contexts. We present findings in the three dimensions: participatory design, ethics for social robots and legal aspects. We accompanied eight research projects on social robots in real-world scenarios for three years. During that time, we spoke, observed, and helped (where possible) the research projects. This gave us specific insights into their work. Our findings work in three dimensions. In participatory design we observed that the trust relationship to users is essential to gain truthful insights and that a mixed method approach is promising. Regarding ethical aspects, we could see that ethical matters should be answered early on. And in the legal dimensions we noticed that the GDPR regulations are a challenge that often requires the help of experts. This work is reflecting on the observation of eight projects and is collecting lessons learned to help future projects and to learn from previous work.
APA, Harvard, Vancouver, ISO, and other styles
10

Fournier-Tombs, Eleonore. "Towards a United Nations Internal Regulation for Artificial Intelligence." Big Data & Society 8, no. 2 (July 2021): 205395172110394. http://dx.doi.org/10.1177/20539517211039493.

Full text
Abstract:
This article sets out the rationale for a United Nations Regulation for Artificial Intelligence, which is needed to set out the modes of engagement of the organisation when using artificial intelligence technologies in the attainment of its mission. It argues that given the increasing use of artificial intelligence by the United Nations, including in some activities considered high risk by the European Commission, a regulation is urgent. It also contends that rules of engagement for artificial intelligence at the United Nations would support the development of ‘good artificial intelligence’, by giving developers clear pathways for authorisation that would build trust in these technologies. Finally, it argues that an internal regulation would build upon the work in artificial intelligence ethics and best practices already initiated in the organisation that could, like the Brussels Effect, set an important precedent for regulations in other countries.
APA, Harvard, Vancouver, ISO, and other styles
11

Kuberkar, Sachin, Tarun Kumar Singhal, and Shikha Singh. "Fate of AI for Smart City Services in India." International Journal of Electronic Government Research 18, no. 2 (April 2022): 1–21. http://dx.doi.org/10.4018/ijegr.298216.

Full text
Abstract:
With the rollout of the smart city initiative in India, this study explores potential risks and opportunities in adopting artificial intelligence (AI) for citizen services. The study deploys expert interview technique and the data collected from various sources are analyzed using qualitative analysis. It was found that AI implementation needs a critical examination of various socio-technological factors to avoid any undesirable impacts on citizens. Fairness, accountability, transparency, and ethics (FATE) play an important role during the design and execution of AI-based systems. This study provides vital insights into AI implications to smart city managers, citizen groups, and policymakers while delivering promised smart city experience. The study has social implications in terms of ensuring that proper guidelines are developed for using AI technology for citizen services, thereby bridging the ever-critical trust gap between citizens and city administration.
APA, Harvard, Vancouver, ISO, and other styles
12

Vărzaru, Anca Antoaneta. "Assessing the Impact of AI Solutions’ Ethical Issues on Performance in Managerial Accounting." Electronics 11, no. 14 (July 16, 2022): 2221. http://dx.doi.org/10.3390/electronics11142221.

Full text
Abstract:
In the contemporary, constantly changing business environment characterized by globalization, openness, and competitiveness, implementing different processes of new information technologies has become a competitive advantage. The field of managerial accounting is a successful example of the implementation of artificial intelligence in operations and the decision-making process based on accounting information. However, ethical issues within managerial accounting and those added through the implementation of artificial intelligence need to be addressed carefully. In this paper, the main objective is to investigate these ethical issues regarding the perception of accountants on the usefulness, efficiency, and effectiveness of implementing artificial intelligence in managerial accounting. To investigate these effects, we conducted a study based on a questionnaire among 396 accountants in Romania who use various artificial intelligence solutions in their activities in managerial accounting. The results of structural equation modeling showed that the ethical issues of autonomy, responsibility, and trust significantly influence the perceived usefulness and the performance of artificial intelligence solutions. The research concludes that artificial intelligence solutions solve many ethical issues in managerial accounting. Still, through their design and application, artificial intelligence solutions can create other ethical problems specific to managerial accounting and business ethics. Therefore, despite all the barriers and reluctance of professionals, artificial intelligence will substantially impact managerial accounting in the years to come.
APA, Harvard, Vancouver, ISO, and other styles
13

Felzmann, Heike, Eduard Fosch Villaronga, Christoph Lutz, and Aurelia Tamò-Larrieux. "Transparency you can trust: Transparency requirements for artificial intelligence between legal norms and contextual concerns." Big Data & Society 6, no. 1 (January 2019): 205395171986054. http://dx.doi.org/10.1177/2053951719860542.

Full text
Abstract:
Transparency is now a fundamental principle for data processing under the General Data Protection Regulation. We explore what this requirement entails for artificial intelligence and automated decision-making systems. We address the topic of transparency in artificial intelligence by integrating legal, social, and ethical aspects. We first investigate the ratio legis of the transparency requirement in the General Data Protection Regulation and its ethical underpinnings, showing its focus on the provision of information and explanation. We then discuss the pitfalls with respect to this requirement by focusing on the significance of contextual and performative factors in the implementation of transparency. We show that human–computer interaction and human-robot interaction literature do not provide clear results with respect to the benefits of transparency for users of artificial intelligence technologies due to the impact of a wide range of contextual factors, including performative aspects. We conclude by integrating the information- and explanation-based approach to transparency with the critical contextual approach, proposing that transparency as required by the General Data Protection Regulation in itself may be insufficient to achieve the positive goals associated with transparency. Instead, we propose to understand transparency relationally, where information provision is conceptualized as communication between technology providers and users, and where assessments of trustworthiness based on contextual factors mediate the value of transparency communications. This relational concept of transparency points to future research directions for the study of transparency in artificial intelligence systems and should be taken into account in policymaking.
APA, Harvard, Vancouver, ISO, and other styles
14

Albrecht, Stefano, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, et al. "Reports of the 2016 AAAI Workshop Program." AI Magazine 37, no. 3 (October 7, 2016): 99–108. http://dx.doi.org/10.1609/aimag.v37i3.2680.

Full text
Abstract:
The Workshop Program of the Association for the Advancement of Artificial Intelligence’s Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16) was held at the beginning of the conference, February 12-13, 2016. Workshop participants met and discussed issues with a selected focus — providing an informal setting for active exchange among researchers, developers and users on topics of current interest. To foster interaction and exchange of ideas, the workshops were kept small, with 25-65 participants. Attendance was sometimes limited to active participants only, but most workshops also allowed general registration by other interested individuals. The AAAI-16 Workshops were an excellent forum for exploring emerging approaches and task areas, for bridging the gaps between AI and other fields or between subfields of AI, for elucidating the results of exploratory research, or for critiquing existing approaches. The fifteen workshops held at AAAI-16 were Artificial Intelligence Applied to Assistive Technologies and Smart Environments (WS-16-01), AI, Ethics, and Society (WS-16-02), Artificial Intelligence for Cyber Security (WS-16-03), Artificial Intelligence for Smart Grids and Smart Buildings (WS-16-04), Beyond NP (WS-16-05), Computer Poker and Imperfect Information Games (WS-16-06), Declarative Learning Based Programming (WS-16-07), Expanding the Boundaries of Health Informatics Using AI (WS-16-08), Incentives and Trust in Electronic Communities (WS-16-09), Knowledge Extraction from Text (WS-16-10), Multiagent Interaction without Prior Coordination (WS-16-11), Planning for Hybrid Systems (WS-16-12), Scholarly Big Data: AI Perspectives, Challenges, and Ideas (WS-16-13), Symbiotic Cognitive Systems (WS-16-14), and World Wide Web and Population Health Intelligence (WS-16-15).
APA, Harvard, Vancouver, ISO, and other styles
15

Marchang, Jims, and Alessandro Di Nuovo. "Assistive Multimodal Robotic System (AMRSys): Security and Privacy Issues, Challenges, and Possible Solutions." Applied Sciences 12, no. 4 (February 19, 2022): 2174. http://dx.doi.org/10.3390/app12042174.

Full text
Abstract:
Assistive robotic systems could be a suitable solution to support a variety of health and care services, help independent living, and even simulate affection, to reduce loneliness. However, adoption is limited by several issues, as well as user concerns about ethics, data security, and privacy. Other than the common threats related to internet connectivity, personal robotic systems have advanced interaction possibilities, such as audio, video, touch, and gestures, which could be exploited to gain access to private data that are stored in the robot. Therefore, novel, safer methods of interaction should be designed to safeguard users’ privacy. To solicit further research on secure and private multimodal interaction, this article presents a thorough study of the state-of-the-art literature on data security and user privacy in interactive social robotic systems for health and care. In our study, we focus on social robotics to assist older people, which is a global challenge that is receiving a great deal of attention from the robotics and social care communities. This application will have a significant positive impact on the economy and society, but poses various security and privacy issues. This article analyses the key vulnerable areas where data leakage could occur during a multimodal interaction with a personal assistive robotic system. Thus, blockchain with a resource-aware framework, along with a continuous multifactor authentication mechanism, are envisaged as a potential solution for making such systems secure by design; therefore, increasing trust, acceptability, and adoption. Among the key cybersecurity research challenges, it is crucial to create an intelligent mechanism that autonomously determines the right trade-off between continuous user prompts and system usability, according to data types and personal preferences.
APA, Harvard, Vancouver, ISO, and other styles
16

Akman, Ibrahim, and Alok Mishra. "Factors influencing consumer intention in social commerce adoption." Information Technology & People 30, no. 2 (June 5, 2017): 356–70. http://dx.doi.org/10.1108/itp-01-2016-0006.

Full text
Abstract:
Purpose Social media remarkably changed the way of interaction between the consumers and organizations. The increased acceptance of social media has given rise to social commerce (s-commerce) and s-commerce usage is gradually increasing over the last few years. The progressive development of technologies suggests that s-commerce will become the mainstream for marketing and a literature survey indicates that there have not been many studies in this area. The purpose of this paper is to predict the factors influencing consumer intention towards the adoption of s-commerce. Design/methodology/approach This study uses a survey approach with reference to important behavioural factors such as satisfaction, ethics, trust, enjoyment/easiness, social pressure and awareness. The research model was developed to be in line with the available literature. The data were collected using a five-point Likert scale and the research model was tested using least square regression. Findings The results showed that user intention is significantly and positively related to perceived trust, enjoyment/easiness, social pressure, satisfaction and awareness. Also, “intention” was found to be a significant mediating factor for actual usage. Research limitations/implications First, the questionnaire was a “snap-shot” instead of longitudinal study. Second, future research should use other moderating variables that may affect the usage of social media. Also the study could apply a variant of research methods to include other techniques such as interviews, which allow for deeper understanding of the problem and issues. Practical implications Social media represents an important platform for electronic commerce and has one of the most metamorphic impacts on business. Therefore, investigating the usage of s-commerce with reference to important behavioural factors could provide valuable information for companies in establishing policies and strategies. It could also be useful for management studies and researchers in understanding the consumers’ attitude towards usage of social media for commercial purposes. Social implications S-commerce creates opportunities for firms. Based on findings this research provides insights with major implications for marketers, who would like to generate direct sales on social network platforms. Originality/value Existing literature focusses largely on the effectiveness of social media. Only a handful has endeavoured to analyse s-commerce systems and the literature on consumers’ behaviour in using s-commerce is not mature yet. This study is one of the few studies in this field, and aims to predict and explain the user acceptance of social media for commercial purposes.
APA, Harvard, Vancouver, ISO, and other styles
17

Koptseva, Natalia. "MODERN RESEARCH IN THE FIELD OF THE SOCIOLOGY OF ARTIFICIAL INTELLIGENCE: BASIC APPROACHES. PART 3." Sociology of Artificial Intelligence 3, no. 2 (June 30, 2022): 7–22. http://dx.doi.org/10.31804/2712-939x-2022-3-2-7-22.

Full text
Abstract:
The article is devoted to the analysis of the most relevant and popular problems of social research of artificial intelligence, the results of which were published in the first quarter of 2022. The actualization of the problems of racism, various forms of social inequality associated with the use of various artificial intelligence algorithms continues. The attitude towards the neural network writer GPR-3 is subjected to massive criticism, despite the fact that the Australian philosopher David Chalmers considers it possible to assert the existence of independent intellectual activity in this computer program. Research continues on the role of artificial intelligence in improving governance, including at the state level. It is suggested that the bureaucratic social class not only will not disappear as artificial intelligence tools are introduced into government, but, perhaps, will strengthen its position. The pressing research in the field of the sociology of artificial intelligence is related to its role in modern medicine. There are ethical and bioethical issues associated with trust in artificial intelligence systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Bocean, Claudiu George, and Anca Antoaneta Vărzaru. "A Two-Stage SEM–Artificial Neural Network Analysis of Integrating Ethical and Quality Requirements in Accounting Digital Technologies." Systems 10, no. 4 (August 12, 2022): 121. http://dx.doi.org/10.3390/systems10040121.

Full text
Abstract:
Digital technologies affect all areas and activities of society. Accounting is no exception to this trend, as organizational information system accounting increasingly integrates digital technologies. The paper aims to study the integration of ethical requirements with the quality requirements in implementing digital technologies based on artificial intelligence, blockchain, the internet of things, and cloud computing in financial and managerial accounting. This empirical study of 396 accountants from Romanian organizations involves investigating the influence of ethical and quality requirements of digital technologies on the perception of users’ satisfaction in financial and managerial accounting. Empirical research encompasses a quantitative approach using structural equation modeling and artificial neural network analysis in a two-stage procedure. Some of the existing ethical issues can be addressed by implementing new digital technologies but implementing these emerging technologies can generate other ethical and quality issues that accounting and IT professionals must address in a combined effort. The research results show that the ethical requirements that influence the perception of financial and managerial accounting are security and trust. Among the quality requirements, the most critical influence in the perception of accountants is reliability.
APA, Harvard, Vancouver, ISO, and other styles
19

Hepenstal, Sam, Leishi Zhang, Neesha Kodagoda, and B. l. william Wong. "Developing Conversational Agents for Use in Criminal Investigations." ACM Transactions on Interactive Intelligent Systems 11, no. 3-4 (December 31, 2021): 1–35. http://dx.doi.org/10.1145/3444369.

Full text
Abstract:
The adoption of artificial intelligence (AI) systems in environments that involve high risk and high consequence decision-making is severely hampered by critical design issues. These issues include system transparency and brittleness, where transparency relates to (i) the explainability of results and (ii) the ability of a user to inspect and verify system goals and constraints; and brittleness, (iii) the ability of a system to adapt to new user demands. Transparency is a particular concern for criminal intelligence analysis, where there are significant ethical and trust issues that arise when algorithmic and system processes are not adequately understood by a user. This prevents adoption of potentially useful technologies in policing environments. In this article, we present a novel approach to designing a conversational agent (CA) AI system for intelligence analysis that tackles these issues. We discuss the results and implications of three different studies; a Cognitive Task Analysis to understand analyst thinking when retrieving information in an investigation, Emergent Themes Analysis to understand the explanation needs of different system components, and an interactive experiment with a prototype conversational agent. Our prototype conversational agent, named Pan, demonstrates transparency provision and mitigates brittleness by evolving new CA intentions. We encode interactions with the CA with human factors principles for situation recognition and use interactive visual analytics to support analyst reasoning. Our approach enables complex AI systems, such as Pan, to be used in sensitive environments, and our research has broader application than the use case discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Popa, Ion, Luminița Nicolescu, Simona Cătălina Ștefan, and Ștefan Cătălin Popa. "The Effects of Corporate Social Responsibility (CSR) on Consumer Behaviour in Online Commerce: The Case of Cosmetics during the COVID-19 Pandemics." Electronics 11, no. 15 (August 5, 2022): 2442. http://dx.doi.org/10.3390/electronics11152442.

Full text
Abstract:
Corporate social responsibility (CSR) is a trend that manifests on a global level. The positive effects of CSR initiatives depend on the reaction of stakeholders, among which customers represent an important category. The purpose of this paper was to analyse the impact that CSR initiatives of cosmetics companies have on customer behaviour in both the short-term (buying intention) and the long-term (client loyalty) in the case of electronic commerce. Starting from the existing literature, the conceptual model proposed different dimensions of CSR as influencers (legal and ethical, philanthropic and community services, respect for environment, respect for consumers), and as mediators, which were considered as the brand trust and the competitive advantage of the company. The research method used was quantitative with the empirical data being collected from 1265 actual and potential consumers of cosmetic products. The hypotheses were tested using the partial least squares structural equation modelling (PLS-SEM). The main findings illustrated positive relationships between CSR and both buying intention and client loyalty, as the two facets of consumer behaviour. The interpretation is that CSR activities can increase both the consumer intentions to buy cosmetics products provided by CSR-involved companies, and increase the long-term customer loyalty for these companies. The research also provided evidence for a strong mediation effect of brand trust for both sides of customer behaviour. This illustrates that when brand trust is higher the effect of CSR initiatives on customer behaviour increases. The paper includes theoretical and practical contributions associated to the results of the research.
APA, Harvard, Vancouver, ISO, and other styles
21

Embarak, Ossama H., Maryam J. Almesmari, and Fatima R. Aldarmaki. "Apply Neutrosophic AHP Analysis of the Internet of Things (IoT) and the Internet of Behavior (IoB) in Smart Education." International Journal of Neutrosophic Science 19, no. 1 (2022): 200–211. http://dx.doi.org/10.54216/ijns.190115.

Full text
Abstract:
The concept of the Internet of Things (IoT) has emerged in recent years to describe our increasingly interconnected physical world. Even if there are now goods on the market that are connected to the Internet of Things, there are still obstacles to be addressed, such as security concerns and a general lack of trust in and familiarity with the technology. The purpose of this research is to examine what goes into making a good Internet of Things (IoT) system for smart education that deals with IoT. In this research, we use neutrosophic theory and the Analytic Hierarchy Process (AHP) to create a decision-support system based on rules for assessing the impactful elements of the Internet of Things in smart education. According to the results of this investigation, security, value, and connectivity are more crucial than intangible qualities (Telepresence and Intelligence). This research suggests that the internet of behavior (IoB) and a sustainable Internet of Things (IoT) ecosystem requires strong IoT security measures to be implemented once smart education has established a reliable IoT connection. Likewise, smart education needs to think about the benefits of IoT security and IoT ethics for the goods they use and the comfort of their staff.
APA, Harvard, Vancouver, ISO, and other styles
22

Prakash, Ashish Viswanath, and Saini Das. "Intelligent Conversational Agents in Mental Healthcare Services: A Thematic Analysis of User Perceptions." Pacific Asia Journal of the Association for Information Systems 12 (June 30, 2020): 1–34. http://dx.doi.org/10.17705/1thci.12201.

Full text
Abstract:
Abstract Background: The emerging Artificial Intelligence (AI) based Conversational Agents (CA) capable of delivering evidence-based psychotherapy presents a unique opportunity to solve longstanding issues such as social stigma and demand-supply imbalance associated with traditional mental health care services. However, the emerging literature points to several socio-ethical challenges which may act as inhibitors to the adoption in the minds of the consumers. We also observe a paucity of research focusing on determinants of adoption and use of AI-based CAs in mental healthcare. In this setting, this study aims to understand the factors influencing the adoption and use of Intelligent CAs in mental healthcare by examining the perceptions of actual users. Method: The study followed a qualitative approach based on netnography and used a rigorous iterative thematic analysis of publicly available user reviews of popular mental health chatbots to develop a comprehensive framework of factors influencing the user’s decision to adopt mental healthcare CA. Results: We developed a comprehensive thematic map comprising of four main themes, namely, perceived risk, perceived benefits, trust, and perceived anthropomorphism, along with its 12 constituent subthemes that provides a visualization of the factors that govern the user’s adoption and use of mental healthcare CA. Conclusions: Insights from our research could guide future research on mental healthcare CA use behavior. Additionally, it could also aid designers in framing better design decisions that meet consumer expectations. Our research could also guide healthcare policymakers and regulators in integrating this technology into formal healthcare delivery systems. Available at: https://aisel.aisnet.org/pajais/vol12/iss2/1/ Recommended Citation Prakash, Ashish Viswanath and Das, Saini (2020) "Intelligent Conversational Agents in Mental Healthcare Services: A Thematic Analysis of User Perceptions," Pacific Asia Journal of the Association for Information Systems: Vol. 12: Iss. 2, Article 1. DOI: 10.17705/1pais.12201
APA, Harvard, Vancouver, ISO, and other styles
23

Siddiqui, Shahida Anusha, Sipper Khan, Misbah Murid, Zarnab Asif, Natalya Pavlovna Oboturova, Andrey Ashotovich Nagdalian, Andrey Vladimirovich Blinov, Salam A. Ibrahim, and Seid Mahdi Jafari. "Marketing Strategies for Cultured Meat: A Review." Applied Sciences 12, no. 17 (September 1, 2022): 8795. http://dx.doi.org/10.3390/app12178795.

Full text
Abstract:
Environmentally intense and negative consequences relateing to conventional meat production systems have induced some actors to suggest alternative meat sources. Diseases carried by animals, human perception of cruelty to animals, and public health concerns about cardiovascular diseases have provided the basis for the development of cultured meat. The current market is influenced by many factors, including regulators, affordability, religion, and media perception. The existing cultured meat market is also regulated by legislatures, affordability, consumer religion, and the media. Consumer perception is distributed across various aspects, including ethical priorities, nutritional profile of the meat consumed, age-based acceptance, gender differentiation, political orientation, land-based attitude, education status, socioeconomic factors, and familiarity factor with the existing product in the market. Inhibiting barriers reported among consumers—including low naturalness, safety, nutritional concerns, trust, neophobia, economic, and ethical approaches—should be employed as marketing tactics directly to address their respective concerns. Tissue culture, starter cells, printing, and 3D printing are some of the methods currently being used for the production of cultured meat. Similarly, many hybrid technologies are also being used to produce meat-like products to increase consumer familiarity along and market presence. Existing research frameworks have improved the previous mindset of consumers with media coverage, educational frameworks, and the textural attributes of cultured meat. Additional benefits of CUME may include being environmentally friendly with less production of greenhouse gases. However, consumer trust, affordability, improving nutritional status, and widescale adoption are just a few of the parameters that need to be addressed to enhance consumer acceptability of these products. The aim of this article was to analyze the current state of cultured meat and the marketing content challenges and strategies used to advance public acceptance of cultured meat.
APA, Harvard, Vancouver, ISO, and other styles
24

Spanaki, Konstantina, Zeynep Gürgüç, Catherine Mulligan, and Emil Lupu. "Organizational cloud security and control: a proactive approach." Information Technology & People 32, no. 3 (June 3, 2019): 516–37. http://dx.doi.org/10.1108/itp-04-2017-0131.

Full text
Abstract:
Purpose The purpose of this paper is to unfold the perceptions around additional security in cloud environments by highlighting the importance of controlling mechanisms as an approach to the ethical use of the systems. The study focuses on the effects of the controlling mechanisms in maintaining an overall secure position for the cloud and the mediating role of the ethical behavior in this relationship. Design/methodology/approach A case study was conducted, examining the adoption of managed cloud security services as a means of control, as well as a large-scale survey with the views of IT decision makers about the effects of such adoption to the overall cloud security. Findings The findings indicate that there is indeed a positive relationship between the adoption of controlling mechanisms and the maintenance of overall cloud security, which increases when the users follow an ethical behavior in the use of the cloud. A framework based on the findings is built suggesting a research agenda for the future and a conceptualization of the field. Research limitations/implications One of the major limitations of the study is the fact that the data collection was based on the perceptions of IT decision makers from a cross-section of industries; however the proposed framework should also be examined in industry-specific context. Although the firm size was indicated as a high influencing factor, it was not considered for this study, as the data collection targeted a range of organizations from various sizes. Originality/value This study extends the research of IS security behavior based on the notion that individuals (clients and providers of cloud infrastructure) are protecting something separate from themselves, in a cloud-based environment, sharing responsibility and trust with their peers. The organization in this context is focusing on managed security solutions as a proactive measurement to preserve cloud security in cloud environments.
APA, Harvard, Vancouver, ISO, and other styles
25

Tolley, C. L., R. A. Sami, and S. P. Slight. "A Qualitative Study Exploring the Barriers and Facilitators Associated with the Implementation of a Closed Loop Medication System in a UK Hospital Trust." International Journal of Pharmacy Practice 29, Supplement_1 (March 26, 2021): i50—i51. http://dx.doi.org/10.1093/ijpp/riab015.062.

Full text
Abstract:
Abstract Introduction Implementation of novel digital technologies into complex hospital systems, particularly within the United Kingdom’s (UKs) National Health Service, is challenging and can result in delays to the use and evaluation of innovative systems. MedEye is a bedside tool for preventing medication administration errors used as part of a closed-loop medication administration system. Aim The aim of this study was to understand the barriers and facilitators associated with implementing MedEye for the first time in a large UK Teaching Hospital Trust. Methods We used a case study approach and conducted semi-structured interviews (n=9) with key members of the project implementation team from Pharmacy (n=3), Nursing (n=2), commercial system provider(n=2), IT (n=1) and academia (n=1) and 20 hours of field observations. We explored stakeholder’s experiences about the implementation process, barriers and facilitators and any key lessons learnt according to constructs from Sittig and Singh’s Eight Dimension Sociotechnical Model.1 We analysed the data from interviews and observations using the framework approach.2 We firstly familiarised ourselves with the data, coded interviews, guided by our analytical framework, charted and then interpreted the data. All necessary ethical and organisational approvals were obtained. Results We identified themes relating to eight sociotechnical domains. Clinical Content: the format of the medication library and process for ordering medications were different to other European sites that had implemented MedEye, posing challenges for developers. Hardware and Software Computing Infrastructure: the integration of MedEye with the electronic prescribing system was one of the “biggest challenges”(P2) and contributed to delays. Human Computer Interface: the MedEye system’s user interface was described as “clean, simple and easy to use”(P2).People: nurses and senior management “absolutely wanted this [project] to work”(P1).Communication and Workflow: it was sometimes difficult to communicate effectively because the IT team had their own “set of jargon which is very technical” and the clinical team used “lots of medical jargon”(P2), resulting in misunderstandings. Internal Organisational Policies, Procedures and Culture: the hospital recognised the potential safety benefits of MedEye. However, its implementation was different to other IT products, which would “have actually gone through the development cycle”(P7).External Rules, Regulations and Pressures: the IT and informatics team’s resources were stretched with multiple projects been implemented simultaneously. System Measurement and Monitoring: the project team conducted “a lot of testing”(P3), to refine the technology. Conclusions This study sought to understand the sociotechnical challenges when implementing a novel digital technology in a UK hospital and identified themes related to eight domains. We acknowledge that our study had a few limitations: we interviewed a small number of participants who were directly involved in the implementation process, and the study was conducted in one hospital Trust, limiting the generalisability of the findings. However, use of the eight-domain sociotechnical framework strengthened our study, allowing us to derive the specific facilitators and barriers to the implementation and deployment process. This study also emphasises the importance of working closely with IT managers who can coordinate work within an organisation to anticipate delays and mitigate against project risks. References 1. Sittig, D.F. and H. Singh, A new sociotechnical model for studying health information technology in complex adaptive healthcare systems. Quality & safety in health care, 2010. 19 Suppl 3(Suppl 3): p. i68-i74. 2. Pope, C., S. Ziebland, and N. Mays, Qualitative research in health care. Analysing qualitative data. BMJ (Clinical research ed.), 2000. 320(7227): p. 114–116.
APA, Harvard, Vancouver, ISO, and other styles
26

Tapuria, Archana, Matt Evans, Vasa Curcin, Tony Austin, Nathan Lea, and Dipak Kalra. "Development and Usability Evaluation of GreyMatters: A Memory Clinic Information System." ACI Open 04, no. 02 (July 2020): e149-e156. http://dx.doi.org/10.1055/s-0040-1719060.

Full text
Abstract:
Abstract Objective This paper presents the development process of GreyMatters, a memory clinic system, outlining the conceptual, practical, technical, and ethical aspects, and focuses on the usability evaluation of the system. There was a need for a system to be developed for the memory clinics of Berkshire Healthcare National Health Service (NHS) Foundation Trust (BHFT) to aid the clinical and administrative processes of assessing, diagnosing, managing, and treating patients with cognitive disorders and mental health problems. Methods The methodology for development of the information system involved phases of requirements gathering, modeling, and prototype creation, and “bench testing” the prototype with experts. The standard Institute of Electrical and Electronics Engineers (IEEE) recommended approach for the specifications of software requirements was adopted. An electronic health record (EHR) standard (EN13606) was used, and clinical modeling was done through archetypes and the project complied with data protection and privacy legislation. Usability evaluation of GreyMatters was done using the IBM questionnaires. Results Though the initial development was complex, the requirements, methodology, and standards adopted made the construction, deployment, adoption, and population of a memory clinic and research database feasible. The electronic patient data including the assessment scales and scores provide a rich source of objective data for audits and research. In the usability evaluation of GreyMatters, overall responses to the Computer System Usability Questionnaire and After-Scenario Questionnaire demonstrated mild-to-moderate satisfaction with the overall system and with individual tasks. The results support that the system is an acceptable tool for clinical, administrative, business, and research use and forms a useful part of the wider information architecture. The implementation and sustainability issues and the lessons learnt were noted. Discussion The development of a system needs to take into account the existing data collection methods and other information systems that will be used alongside. Use of graphical development tools to communicate requirements, build interfaces, and prototype may improve the quality and efficiency of system development. Standardized data collection assists in the provision of reports for clinical, audit, and service development use to meet the requirements of commissioners and to allow the easier identification of potential research participants. It is possible that in the usability evaluation, the satisfaction scores are overall lower due to the extra complication of using this system in addition to the Trust's main EHR. The small number of users is a limitation. Conclusion The establishment of requirements and methodology, addressing issues of data security and confidentiality, future data compatibility, and interoperability and medicolegal aspects, such as access controls and audit trails, led to a robust and useful system. The system was modeled around health record standards that are based on long established research on EHR standards and archetypes which differentiates GreyMatters from simple web-based capture forms that were built in house by the Trust. Its strength is that it provides flexibility to record clinical information that the existing Trust systems can't. The evaluation supports that the system is an acceptable tool for clinical, administrative, and research use. Some aspects of the system like prescribing module do need further work.
APA, Harvard, Vancouver, ISO, and other styles
27

Mutula, Stephen M. "Ethics and trust in digital scholarship." Electronic Library 29, no. 2 (April 12, 2011): 261–76. http://dx.doi.org/10.1108/02640471111125212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tomaiuolo, Michele. "Trust Enforcing and Trust Building, Different Technologies and Visions." International Journal of Cyber Warfare and Terrorism 2, no. 4 (October 2012): 49–66. http://dx.doi.org/10.4018/ijcwt.2012100104.

Full text
Abstract:
Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.
APA, Harvard, Vancouver, ISO, and other styles
29

Brill, J. Christopher, James P. Bliss, Peter A. Hancock, Dietrich Manzey, Joachim Meyer, and Alison Vredenburgh. "Matters of Ethics, Trust, and Potential Liability for Autonomous Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 308–12. http://dx.doi.org/10.1177/1541931213601070.

Full text
Abstract:
Abstract – The objective of this panel was to discuss issues related to the development and use of autonomous systems, with specific focus on the overriding themes of ethical considerations and potential liability for Human Factors and Ergonomics (HF/E) professionals who are involved in their development. Chris Brill provided opening remarks to frame the discussion and introduce the panelists. James Bliss discussed legal implications related to our collective penchant for developing conservative, false-alarm prone automation. Peter Hancock advocated for human-centered constraints on autonomous systems, as they may, one day, pose an existential threat to humanity. Dietrich Manzey discussed ethical considerations for autonomous systems, including how design can encourage ethical user behavior. Joachim Meyer argued that HF/E professionals have an obligation to help designers understand the ethical implications of poor design, particularly in the context of autonomous systems. Lastly, Alison Vredenburgh provided thoughts on potential liability for HF/E professionals, particularly in light of the relative newness of autonomous systems. The panel then turned to facilitated discussion with panelists and audience members. Specific themes included the boundaries of our responsibilities as HF/E professionals for ill-conceived or morally-objectionable systems, potential implications of manipulating user trust through design, cross-cultural perspectives on public acceptance and legal peril, and how concerns might differ by domain (e.g., medical vs. combat vs. manufacturing). The session concluded with panelists summarizing how ethics influence design and recommendations for how HF/E professionals can potentially protect themselves from legal liability for mishaps involving autonomous systems they helped develop.
APA, Harvard, Vancouver, ISO, and other styles
30

Omrani, Nessrine, Giorgia Rivieccio, Ugo Fiore, Francesco Schiavone, and Sergio Garcia Agreda. "To trust or not to trust? An assessment of trust in AI-based systems: Concerns, ethics and contexts." Technological Forecasting and Social Change 181 (August 2022): 121763. http://dx.doi.org/10.1016/j.techfore.2022.121763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Galli, Brian J. "Ethics of Electronic Health Record Systems." International Journal of Information Systems and Social Change 9, no. 3 (July 2018): 53–69. http://dx.doi.org/10.4018/ijissc.2018070104.

Full text
Abstract:
This article describes how healthcare and IT are combatting the ethical implications of electronic health records (EHRs) in order to make them adopted by over 90% of small practices. There is a lack of trust in EHRs and uneasiness about what they will accomplish. Furthermore, security concerns have become more prevalent as a result of increased hacker activity. The objective of this article is to analyze these ethical issues in an effort to eliminate them as a hinderance to EHR implementation. As of now, 98% of all hospitals use EHRs. Between 2009 and 2015, the government allocated money and resources for incentive programs to get EHRs into every healthcare providers' office. During this time period, over $800 million dollars facilitated EHR implementation. Using this as a tool EHRs negative perception can be revitalized and combated with the meaningful use program. This article will highlight the ethical implications of EHRs and suggest ways in which to avoid them to make EHRs available in every healthcare provider.
APA, Harvard, Vancouver, ISO, and other styles
32

Alexander, Gregory L. "Issues of Trust and Ethics in Computerized Clinical Decision Support Systems." Nursing Administration Quarterly 30, no. 1 (January 2006): 21–29. http://dx.doi.org/10.1097/00006216-200601000-00005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Khaminkhiew, Lek, Somkid Sroinam, and Nawattakorn Homsin. "The Study of Competencies of Secondary School Principals in 21st Century." Public Administration Research 8, no. 2 (October 3, 2019): 1. http://dx.doi.org/10.5539/par.v8n2p1.

Full text
Abstract:
This study aims to develop the competency indicators of secondary school principals in the 21st century and to examine the consistency of competency indicators structure model of secondary school principals in 21st century with empirical data. There are two stages in the process of research. Step 1 is conducting theoretical structure model of secondary school principals in the 21st century by documentary synthesis, gathering draft models of the theoretical indicators structure and the in-depth interview with nine experts were used to formulate a theoretical model. The instrument was the interview questionnaire titled, “the competency indicators of secondary school principals in 21st century”. Data is analyzed by applying interview results for data organizing, data displaying and interpretation, conclusion, and the summary of theoretical indicator structure model. Step 2 is the checking the consistency of structure model of competency indicators of the secondary school principals in 21st century. The population were 933 secondary school principals under the Office of Secondary Educational Service Area 19 – 33 in academic year 2017, and 500 of them were the samples selecting by Two-Stage Random Sampling. The instrument were created by using indicators and components obtained from Step 1 to create the 5 – rating scale questionnaire. Reliability value was .996 and data analysis use Computer Software. The study findings were as follows: The competencies of secondary school principals in 21st century consisted of 6 core competencies and 23 sub-components including: 1) Modern management core components consists of 3 sub-components; Strategic change management, Empowerment of assigning decision responsibility, and Using resources efficiency, 2) Team work core components consists of 5 sub-components; Participative management, Cooperation, Accompany with assigning strategic and goal setting, Creating mutual trust and Communication, 3) Individual and personnel development core components consists of 3 sub- components; Emotional management, Self and personnel understanding, and Ethics and virtue, 4) Administrative Innovation for development core components consists of 4 sub- components; Creating innovation management, Using technology for management, Making organization of learning, and Knowledge management, 5) Thinking development core components consists of 4 sub-components; Creative thinking, Critical thinking, Analytical thinking and Systems thinking, 6) Academic leadership core competency consists of 4 sub-components; School Curriculum development, Learning process development, Supervision in school ,and Student development and then the adjusted model is good consistent with empirical data, considering from the chi-square test which is statistically significant at 176.06, with no statistical significance, df = 153. Chi-Square is 0.15 GFI, 0.97 AGFI is 0.95 CFI = 1.00 SRMR is 0.02, RMSEA is 0.02, and CN is 552.38. It shows that the Equation of Equation Consistent with empirical data.
APA, Harvard, Vancouver, ISO, and other styles
34

Myskja, Bjørn K. "The categorical imperative and the ethics of trust." Ethics and Information Technology 10, no. 4 (October 7, 2008): 213–20. http://dx.doi.org/10.1007/s10676-008-9173-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hergert, Tom. "Consultant’s dilemmas: Trust, ethics, and effective practice across cultures." TechTrends 47, no. 6 (November 2003): 26–33. http://dx.doi.org/10.1007/bf02763281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zheng, Xianghan, and Vladimir Oleshchuk. "Trust enhancement of P2PSIP communication systems." International Journal of Internet Technology and Secured Transactions 3, no. 2 (2011): 121. http://dx.doi.org/10.1504/ijitst.2011.039773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yajun, Guo, Yu Zhongqiang, Chen Hao, and Dong Huihui. "Trust Architecture in Dynamic Systems." International Journal of Distributed Sensor Networks 5, no. 1 (January 2009): 20. http://dx.doi.org/10.1080/15501320802508378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Smith, H. Jeff. "Ethics and information systems." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 33, no. 3 (August 29, 2002): 8–22. http://dx.doi.org/10.1145/569905.569908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Nahavandi, Saeid. "Trust in Autonomous Systems-iTrust Lab: Future Directions for Analysis of Trust With Autonomous Systems." IEEE Systems, Man, and Cybernetics Magazine 5, no. 3 (July 2019): 52–59. http://dx.doi.org/10.1109/msmc.2019.2916239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Tomaiuolo, Michele. "A Critical Comparison of Trusted Computing and Trust Management Technologies." International Journal of Cyber Warfare and Terrorism 4, no. 4 (October 2014): 64–81. http://dx.doi.org/10.4018/ijcwt.2014100105.

Full text
Abstract:
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modern Service-Oriented Architectures.
APA, Harvard, Vancouver, ISO, and other styles
41

Ye, Bo, Maziar Nekovee, Anjum Pervez, and Mohammad Ghavami. "Automatic trust calculation for service‐oriented systems." IET Software 8, no. 3 (June 2014): 134–42. http://dx.doi.org/10.1049/iet-sen.2013.0056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Szegedi, Krisztina, and Roland Szilagyi. "Ethics And Compliance Whistleblowing Systems In Hungarian Large Companies." European Scientific Journal, ESJ 12, no. 7 (March 30, 2016): 94. http://dx.doi.org/10.19044/esj.2016.v12n7p94.

Full text
Abstract:
In this research we were looking for the answer to the question whether ethics and compliance whistleblowing systems operating in developed countries can also work in large companies in a central European formerly socialist country where on the one hand ethics institutionalization dates back to a shorter period of time and on the other hand people associate whistleblowing systems with the network of informers and if so, how do they work. The aims of this study are: (1) to introduce the theoretical background the concepts of whistle blowing, (2) to describe the results of international and domestic researches regarding whistleblowing systems, and (3) to use quantitative research methods to investigate the characteristics of whistleblowing systems in large Hungarian companies. The empirical survey indicates that company whistleblowing systems work less efficiently in practice in the surveyed company range which might refer to the deficiency in the external and internal ethics communication as well as to the low level of trust.
APA, Harvard, Vancouver, ISO, and other styles
43

Beck, Roman. "Designing Reputation and Trust Management Systems." Journal of Electronic Commerce in Organizations 6, no. 4 (October 2008): 8–29. http://dx.doi.org/10.4018/jeco.2008100102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Acemyan, Claudia Ziegler, Philip Kortum, and Frederick L. Oswald. "The Trust in Voting Systems (TVS) Measure." International Journal of Technology and Human Interaction 18, no. 1 (January 2022): 1–23. http://dx.doi.org/10.4018/ijthi.293196.

Full text
Abstract:
It is essential to democracy that voters trust voting systems enough to participate in elections and use these systems. Unfortunately, voter trust has been found to be low in many situations, which could detrimentally impact human-computer interactions in voting. Therefore, it is important to understand the degree to which voters trust any specific voting method. Voting researchers have developed and used measures of overall trust in technology; yet researchers have long argued that trust in systems is domain-specific, implying that system-specific measures should be used instead. To address this latter point, this paper describes the development of a psychometrically reliable and validated instrument called the Trust in Voting Systems (TVS) measure. The TVS not only allows researchers to understand group mean differences in trust across voting systems; it also allows researchers to understand individual differences in trust within systems—all of which collectively serves to inform and improve voting systems.
APA, Harvard, Vancouver, ISO, and other styles
45

Calhoun, Charles, Mary Ellen Oliverio, and Philip Wolitzer. "Ethics and the Cpa: Building Trust and Value Added Services." EDPACS 26, no. 11 (May 1999): 15. http://dx.doi.org/10.1201/1079/43239.26.11.19990501/30207.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bertino, E., E. Ferrari, and A. Squicciarini. "Trust negotiations: concepts, systems, and languages." Computing in Science and Engineering 6, no. 4 (July 2004): 27–34. http://dx.doi.org/10.1109/mcse.2004.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bowen, Jonathan. "The ethics of safety-critical systems." Communications of the ACM 43, no. 4 (April 2000): 91–97. http://dx.doi.org/10.1145/332051.332078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

McFarland, M. C. "Standards-ethics and the safety of computer systems." Computer 24, no. 2 (1991): 72–75. http://dx.doi.org/10.1109/2.67211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kovach, Vanya. "Medication event monitoring systems, health resources and trust." Health Care Analysis 6, no. 4 (December 1998): 321–23. http://dx.doi.org/10.1007/bf02678370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ramezani, Monir, Fazlollah Ahmadi, Eesa Mohammadi, and Anoshirvan Kazemnejad. "The grounded theory of “trust building”." Nursing Ethics 26, no. 3 (November 7, 2017): 753–66. http://dx.doi.org/10.1177/0969733017734411.

Full text
Abstract:
Background: Despite the growing importance of spiritual care, the delivery of spiritual care is still an area of disagreement among healthcare providers. Objective: To develop a grounded theory about spiritual care delivery based on Iranian nurses’ perceptions and experiences. A grounded theory approach: A qualitative study using the grounded theory approach. Participants and research context: Data were collected through holding 27 interviews with 25 participants (17 staff nurses, 3 physicians, 3 patients, 1 family member, and 1 nurse assistant). The study setting was the Imam Khomeini Hospital Complex. Sampling was started purposively and continued theoretically. Data analysis was performed by the method proposed by Strauss and Corbin. Ethical consideration: The study was approved by the Ethics Committee of Tarbiat Modares University and the agreement of the administrators of the study setting was got before starting the study. Results: The core category of the study was “Trust building” which reflected the nature of spiritual care delivery by nurses. Trust building was the result of eight main categories or strategies including creating a positive mentality at hospital admission, understanding patients in care circumstances, having a caring presence, adhering to care ethics, developing meaningful relationships, promoting positive thinking and energy, establishing effective communication with patients, and attempting to create a safe therapeutic environment. Poor interprofessional coordination negatively affected this process while living toward developing greater cognizance of divinity and adhering to the principles of professional ethics facilitated it. The outcome of the process was to gain a sense of partial psychological security. Conclusion: The “Trust building” theory can be used as a guide for describing and expanding nurses’ roles in spiritual care delivery, developing care documentation systems and clinical guidelines, and planning educational programs for nursing students and staff nurses.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography