Academic literature on the topic 'Trust (digital)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust (digital).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trust (digital)"

1

Ferrari, Elena, and Bhavani Thuraisingham. "Digital Trust: Trust Management in Cyberspace." IEEE Internet Computing 24, no. 6 (November 1, 2020): 6–7. http://dx.doi.org/10.1109/mic.2020.3028898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Gwangjae, and Jee Young Lee. "Digital Trust Gap." Journal of Telecommunications and the Digital Economy 8, no. 2 (June 26, 2020): 94–109. http://dx.doi.org/10.18080/jtde.v8n2.237.

Full text
Abstract:
This study examines the relationship between an information and communication technology (ICT) environment developed by strong national policy and the level of user trust in cyberspace in South Korea, using a secondary data analysis of a national survey dataset. We categorised a subsample into the following types of online activities: ‘content creation’, ‘transaction’ and ‘communication’. Each category was analysed by the types of information and the users’ experience while using the internet. The results revealed that the more internet experience a user had, the less they trusted information in cyberspace. In contrast, less experienced users perceived information in cyberspace to be more trustworthy. This was especially evident during transaction and content creation activities. These results differ from existing studies, which showed that developments to the ICT environment with increased internet usage were strongly correlated with increased trust. We present some suggestions drawn from the results of this study that focus on online trust in relation to the ICT environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Ickes, Justine. "Digital Opportunity Trust." Information Development 23, no. 2-3 (May 2007): 103–5. http://dx.doi.org/10.1177/0266666907079076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aderibigbe, O. S., and T. A. Okunade. "Performance Assessment of Collaborative Trust Models." Advances in Multidisciplinary and scientific Research Journal Publication 11, no. 1 (March 30, 2023): 65–77. http://dx.doi.org/10.22624/aims/digital/v11n1p5.

Full text
Abstract:
This study assessed existing Collaborative Models for trust awareness to ensure effective friend-to-friend collaboration in an overlay network for better control of private data towards a robust social media interaction. The result obtained showed that the Trust-Aware Model (T-AM) demonstrated significant reliability regarding recommendation accuracy and convergence. This was because benchmarking the result from assessing the T-AM with the result from that of assessing existing collaborative models, showed that the T-AM had an accuracy of 0.875, and that of the existing collaborative model was 0.750. While the T-AM had a convergence value of 0.125, that of the existing collaborative model was 0.250. The existing model had an effectiveness value of 0.1875, while the T-AM had an effectiveness value of 0.1094. This implies that the T-AM provided improved recommendation accuracy considering the standard scale of 0 to 1, and convergence (in terms of time) on a scale of 0 to 1. The implication of this is that the T-AM’s ability to make recommendations is very significant since its accuracy value was 0.875 as compared to 0.750 of the existing collaborative models. For convergence, based on the scale rating provided above, it means that the T-AM provided accurate recommendations in a convergence of time of 0.125 as compared to 0.250 for the existing collaborative model. However, in terms of effectiveness, the T-AM performed less with an effectiveness value of 0.1094 as compared to the effectiveness value of 0.1875 of the existing collaborative models. The study concluded that trust data was effectively managed using the distributed hash table and symmetric replication methods, with significant improvement in reputational accuracy and convergence without compromising on scalability and secured online collaboration. Keywords: Trust Awareness, Effectiveness, Convergence, Accuracy, Collaborative Model
APA, Harvard, Vancouver, ISO, and other styles
5

Ki, Noah Seong. ""Digital Asset Trust - Digital Asset as a Property, Implied Express Trust -"." Korea Financial Law Association 19, no. 2 (September 30, 2022): 169–213. http://dx.doi.org/10.15692/kjfl.19.2.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yakel, Elizabeth, Ixchel M. Faniel, Adam Kriesberg, and Ayoung Yoon. "Trust in Digital Repositories." International Journal of Digital Curation 8, no. 1 (June 14, 2013): 143–56. http://dx.doi.org/10.2218/ijdc.v8i1.251.

Full text
Abstract:
ISO 16363:2012, Space Data and Information Transfer Systems - Audit and Certification of Trustworthy Digital Repositories (ISO TRAC), outlines actions a repository can take to be considered trustworthy, but research examining whether the repository’s designated community of users associates such actions with trustworthiness has been limited. Drawing from this ISO document and the management and information systems literatures, this paper discusses findings from interviews with 66 archaeologists and quantitative social scientists. We found similarities and differences across the disciplines and among the social scientists. Both disciplinary communities associated trust with a repository’s transparency. However, archaeologists mentioned guarantees of preservation and sustainability more frequently than the social scientists, who talked about institutional reputation. Repository processes were also linked to trust, with archaeologists more frequently citing metadata issues and social scientists discussing data selection and cleaning processes. Among the social scientists, novices mentioned the influence of colleagues on their trust in repositories almost twice as much as the experts. We discuss the implications our findings have for identifying trustworthy repositories and how they extend the models presented in the management and information systems literatures.
APA, Harvard, Vancouver, ISO, and other styles
7

VLASOV, Maksim V., Ol'ga N. BUCHINSKAYA, and Vasilii V. SUKHIKH. "Digital environment of trust." Economic Analysis: Theory and Practice 20, no. 7 (July 29, 2021): 1343–67. http://dx.doi.org/10.24891/ea.20.7.1343.

Full text
Abstract:
Subject. The paper analyzes the digital environment of trust, its role in processes of digitalization of economic relationships, problems of trust, arising during the use of digital tools in the society. Objectives. The purpose is to perform a theoretical analysis of the digital environment of trust, identify and study external and internal factors affecting the emergence and strengthening of threats to the digital environment of trust, develop proposals to reduce these threats. Methods. We apply general scientific methods of knowledge, systems approach, methodological tools of institutional theory, comparative analysis of modern approaches to the study of digitalization, and evaluation of digital economy development. Results. We substantiate the use of the “digital environment of trust” term, undertake a theoretical analysis of digital environment of trust. The latter enabled to describe and investigate threats to digital environment of trust and propose measures to reduce the revealed threats. Conclusions. Digitalization increases risk and uncertainty in economic relations. Only trust can encourage people to take digitization without fears to go to the new digital world. It is crucial to create a digital environment of trust, i.e. certain conditions of interaction in the digital world that would help achieve a high level of confidence in digital technologies.
APA, Harvard, Vancouver, ISO, and other styles
8

Casey, Eoghan. "Trust in digital evidence." Digital Investigation 31 (December 2019): 200898. http://dx.doi.org/10.1016/j.fsidi.2019.200898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kelton, Kari, Kenneth R. Fleischmann, and William A. Wallace. "Trust in digital information." Journal of the American Society for Information Science and Technology 59, no. 3 (2008): 363–74. http://dx.doi.org/10.1002/asi.20722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Vikas, and Prasann Pradhan. "Trust Management." International Journal of Service Science, Management, Engineering, and Technology 11, no. 4 (October 2020): 26–44. http://dx.doi.org/10.4018/ijssmet.2020100102.

Full text
Abstract:
Trust and identity are the fundamental issues to both the social as well as digital environments. An individual or a group require both of these identities to recognize, interact, and communicate in the present day social and digital worlds. In the social environment, the concept of trust and identity are different than in digital environments, but without a clear sense of identity, there can be a no ground for building the trust. Trust is helpful in supporting the identity to survive and to build relations with other identity in a particular environment. Trust management on the other hand provides a basis to establish the trust and ensure its continuity and longevity. This article compares the social and digital identities with respect to trust issues in the present-day digital scenario. Characteristics, identification process, and lifecycle of both the identities have been presented along with the threats. The work is very helpful in mapping the social scenario to the digital scenario.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Trust (digital)"

1

Danidou, Ioanna. "Trusted computing or trust in computing? : legislating for trust networks." Thesis, University of Edinburgh, 2017. http://hdl.handle.net/1842/22077.

Full text
Abstract:
This thesis aims to address several issues emerging in the new digital world. Using Trusted Computing as the paradigmatic example of regulation though code that tries to address the cyber security problem that occurs, where the freedom of the user to reconfigure her machine is restricted in exchange for greater, yet not perfect, security. Trusted Computing is a technology that while it aims to protect the user, and the integrity of her machine and her privacy against third party users, it discloses more of her information to trusted third parties, exposing her to security risks in case of compromising occurring to that third party. It also intends to create a decentralized, bottom up solution to security where security follows along the arcs of an emergent “network of trust”, and if that was viable, to achieve a form of code based regulation. Through the analysis attempted in this thesis, we laid the groundwork for a refined assessment, considering the problems that Trusted Computing Initiative (TCI) faces and that are based in the intentional, systematic but sometimes misunderstood and miscommunicated difference (which as we reveal results directly in certain design choices for TC) between the conception of trust in informatics (“techno-trust”) and the common sociological concept of it. To reap the benefits of TCI and create the dynamic “network of trust”, we need the sociological concept of trust sharing the fundamental characteristics of transitivity and holism which are absent from techno-trust. This gives rise to our next visited problems which are: if TC shifts the power from the customer to the TC provider, who takes on roles previously reserved for the nation state, then how in a democratic state can users trust those that make the rules? The answer lies partly in constitutional and human rights law and we drill into those functions of TC that makes the TCI provider comparable to state-like and ask what minimal legal guarantees need to be in place to accept, trustingly, this shift of power. Secondly, traditional liberal contract law reduces complex social relations to binary exchange relations, which are not transitive and disrupt rather than create networks. Contract law, as we argue, plays a central role for the way in which the TC provider interacts with his customers and this thesis contributes in speculating of a contract law that does not result in atomism, rather “brings in” potentially affected third parties and results in holistic networks. In the same vein, this thesis looks mainly at specific ways in which law can correct or redefine the implicit and democratically not validated shift of power from customer to TC providers while enhancing the social environment and its social trust within which TC must operate.
APA, Harvard, Vancouver, ISO, and other styles
2

Ramos-Pedersen, Tirsa Rosalba. "The Importance of Building Trust in Digital Co-Design." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21196.

Full text
Abstract:
Social distancing due to the coronavirus disease 2019 (COVID-19) has caused designers to rethink how they engage with users. This project involves a designer and users co-creating a digital workshop for ideating solutions through the use of information and communication technologies (ICT). The context of COVID-19 was used as a means to engage with users through digital co-design activities. However, the aim of the project was not to solve their problems of information sharing, but to understand what participants need from a facilitator in order to have more meaningful dialogues and contribute to the ideation process. The importance of trust and a sense of empowerment were identified as what participants need to better ideate and innovate. Trust and empowerment are valuable in any co-design situation, physical or digital. However, when interacting with participants through strictly digital means, it requires more time and energy to nurture trust between a designer and users. The knowledge gained through this digital co-design project resulted in not only a co-created digital prototype for remote co-design, but guidelines for how to develop trust with users when co-designing remotely.
APA, Harvard, Vancouver, ISO, and other styles
3

McCullagh, Adrian J. "The incorporation of trust strategies in digital signature regimes." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Han. "Extralegal arbitration of trust in digital and quasi-digital markets : an intermediary-based approach /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p9992951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makan, J. "Understanding trust and confidence in web behaviour." Thesis, University of Salford, 2015. http://usir.salford.ac.uk/34453/.

Full text
Abstract:
Trust is recognised as the construct that makes societies function; not only this but it is understood to be the element that makes them successful, wealthier, healthier and wiser. A problem of the trust construct is that, despite its perceived importance on facilitating modern life, it remains a subject that lacks consensus on its definition. Within literature, when the construct of trust is applied to the Web context, there is further confusion as the construct being referred to as trust in actual fact referring to the construct of confidence. This confusion led to the research in understanding trust and confidence in Web behaviour. In addition to researching the literature, the diary-study interview method was used to investigate into how the constructs of trust and confidence function on the Web. The diary study was designed to act as an observational research method, and in doing so would identify the what and how participants used the Web, with the follow-up interviews extracting the why. When taking the core-concept understanding of trust (as developed within this thesis), it shows there to be a disparity between trust and its applicability to the Web. The study further supports this view, and from this emerges the key finding that Web interactions are facilitated and driven by confidence – not trust. Confidence is the construct that drives the Web; what impacts and influences the behaviour of its users. Secondly, and more crucially, confidence is a construct that cannot be created on the Web per se. It is shaped by an individuals' worldview (optimistic / pessimistic), their disposition to risk, their cultural tendencies, their personalities, all of which are factors that are influenced by, and built up on, real-world experiences. Put simply, confidence is created through real-world experiences and it is the real-world atti-tude of an individual that is carried over to govern the nature of their Web interactions.
APA, Harvard, Vancouver, ISO, and other styles
6

Reagle, Joseph M. (Joseph Michael). "Trust in a cryptographic economy and digital security deposits : protocols and policies." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/11016.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. 106-113).
by Joseph M. Reagle, Jr.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
7

Holmgren, Linda, and Emira Meskic. "Digitaliseringens påverkan på kundrelationen inom revisionsbranschen, utifrån en revisors perspektiv : - En studie utförd på den svenska revisionsbranschen." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69911.

Full text
Abstract:
Digitaliseringen tar en allt större roll i det svenska samhället, vilket leder till att företag måste anpassa sig efter förändringarna som digitaliseringen innebär. Anpassningen görs eftersom att revisionsbranschen är en institution som strävar efter högt socialt kapital. Syftet med examensarbetet är att förklara hur digitaliseringen påverkar kundrelationen mellan revisorn och kunden inom revisionsbranschen, utifrån revisorns perspektiv. För att uppnå syftet tar uppsatsen sin utgångspunkt i det positivistiska synsättet och i en teoretisk referensram som ligger till grund för en utvecklad analysmodell. Den teoretiska referensramen visar på betydelsen av socialt kapital för att bygga upp meningsfulla värden och utveckla långsiktiga relationer. Empirin har samlats in genom en såväl kvantitativ som kvalitativ metod där revisorers åsikter kring hur digitaliseringen påverkar relationen i branschen ligger till grund för examensarbetets slutsatser. Resultatet från empirin har kodats och analyserats i flera analysmodeller. Bland annat ett hypotestest som visade på att tre av uppsatsens fyra hypoteser kunde verifieras. Examensarbetets diskussion och slutsats visar på flertalet intressanta resultat. Ett utmärkande resultat är att revisionsbranschen är en institution där arbetssättet utvecklats från att vara formellt till informellt. Anledningen till detta är att det finns en stark norm inom professionen som underbyggs av ett sådant arbetssätt som är djupt rotad i digitalisering. Examensarbetets resultat redogör även för att fysiska möten inte är lika självklara idag som tidigare. Dock går de inte att utesluta helt då de krävs för att bygga och underhålla en långsiktig relation. Resultatet visar även att det är viktigt att bemöta kunders förväntningar och reducera osäkerhet. En skillnad mellan kvinnor och män i valet av att gå på informella sammankomster med en kund har även uppmärksammats. Examensarbetet visar på ytterligare en skillnad, som är mellan yngre och äldre där yngre är mer positiv till digital kommunikation framför personlig kommunikation. Avslutningsvis bekräftar examensarbetet att digitaliseringen påverkar relationen mellan revisorn och kunden och att digitala relationer som utvecklas inom branschen är en institution.
Digitalization takes an increasing role in the Swedish society, which means that companies must adapt to the changes that digitalization leads to. The adjustments are made on the basis that the audit industry is an institution that strives for high social capital. The purpose of this study is to explain how digitalization affects the relationship between the auditor and the customer in the audit industry, based on the auditor's perspective. To achieve the study’s objective, it is based on a positivist approach and the theoretical framework is the foundation for the analytical model. It defined the importance of social capital to build meaningful values and develop long-term relationships. The data collection is based on both quantitative and qualitative methods, where the core is to investigate how digitization affects the relationship in the industry. The collected data has been coded and analyzed in several analysis models. For example, one test of hypothesis which showed that three of the study’s four hypotheses could be verified. The discussion and conclusion of the study showed multiple interesting results, where a distinguish result was that the audit profession in an institution and the working process has changed from being formal to be informal. The reason is that the norm within the profession is deeply rooted in digitalization. The study also concluded that meetings face-to-face are not as self-evident today as it was before the development of digitalization. However, face-to-face meetings cannot be eliminated as they are seen as necessary to develop a long and sustainable relationship and whereas digital tools of communications are seen as a complement. The results also suggests the importance to meet customer expectations and reducing uncertainty. The thesis also found a difference between women and men in the choice of attending to informal meetings. It was also recognized that younger has an increasing interest in digital communications, compare to older auditors. Finally the study confirms that digitalization affects the relationship between the auditor and the customer, and that digital relationships developed in the auditing industry are an institution.
APA, Harvard, Vancouver, ISO, and other styles
8

Tshweu, Glenn Tiisetso. "An investigation into the extent to which South African repositories comply with international trust standards." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/58768.

Full text
Abstract:
An institutional repository is seen as a valuable tool to manage digital resources within the organisational context. Repositories can have a positive or negative influence on how an institution manages its digital material in relation to accessibility and dissemination of digital material. The functionality and status quo of digital repositories can be assessed and measured based on specific guidelines to determine practicality and efficacy. The guidelines used in this regard are known as international repository assessment standards. These standards have been developed by leading organisations that specialise in knowledge creation to develop controlled, consensus-based, market-relevant international standards that can be used to support innovation and provide resolutions to global challenges. In the event where an institution wishes to assess its digital repository using international standards, the underlying purpose of the assessment exercise is for the digital repository to gain trust accreditation. This study aimed to develop a South African digital repository trust assessment model based on the criteria of international standards. This study investigated the level of trust compliance that a very small sample of South African digital repositories met – using the developed model. The investigation process is also aimed at receiving feedback (in the form of recommendations) from digital repository managers to improve the developed model to make it more useful for South African digital repositories. Furthermore, the study intended to yield further research into the complex topic of digital repository assessment based on international standards. Overall, this research study revealed that South African digital repositories are not far off in complying with the full requirements of international repository assessment standards.
Mini Dissertation (MIT)--University of Pretoria, 2016.
Carnigie
Information Science
MIT
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
9

Schetinger, Victor Chitolina. "Beyond digital, imagens, and forensics : towards a regulation of trust in multimedia communication." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/182284.

Full text
Abstract:
Esta tese discute o papel da Análise Forense de Imagens como reguladora de mídia digital na sociedade. Isto inclui um estudo com mais de 400 indivíduos para determinar suas capacidades de detectar edições em imagens. Os resultados desse experimento indicam que humanos são facilmente enganados por imagens digitais, tendo dificuldades em diferenciar entre imagens pristinas e editadas. A tese então analisa a efetividade do arsenal de análise forense de imagens contra o estado-da-arte de composição de imagens. Através da análise de padrões fundamentais de imagens, as técnicas forenses são capazes de detectar a presença da maioria das operações de composição testadas. A tese então apresenta uma abordagem alternativa para análise forense de imagens, baseada na geração automática de planos. Ao tratar o processo de inspeção de uma imagem como um plano composto de múltiplos passos, propusemos uma arquitetura que é capaz de indicar os passos necessários para analisar uma imagem. Os planos são baseados em uma modelagem formal do conhecimento e técnicas forenses, de modo que possam ser traduzidos em passos a serem executados. A tese então demonstra que os limites de tal abordagem dependem da dificuldade de validar tal solução. Isso é uma consequência da natureza dos problemas de análise forense de imagens: essencialmente, são problemas de confiança distribuída entre indivíduos com acesso limitado à informação. Essa configuração é analisada de diferentes perspectivas em busca dos limites práticos para a análise forense de imagens digitais. Os resultados dessa análise sugerem que a área falha em produzir soluções acessíveis para a sociedade não por limitações técnicas, mas pela falta de um engajamento multi-disciplinar. A tese então discute como paradoxos filosóficos surgem naturalmente em cenários de análise forense de imagens. A análise forense de imagens digitais lida, essencialmente, com comunicação humana e, como tal, está sujeita a todas suas complexidades. Finalmente, é argumentado que o caminho para construir soluções úteis para a sociedade requer um esforço coletivo de diferentes disciplinas do conhecimento. É responsabilidade da comunidade forense desenvolver uma teoria epistemológica comum e acessível para este projeto coletivo.
This thesis discusses the role of Digital Image Forensics as a regulator of digital media in society. This includes a perceptual study with over 400 subjects to assess their ability to notice editing in images. The results of such experiment indicate that humans are easily fooled by digital images, not being able to tell apart edited and pristine images. The thesis then analyzes the effectiveness of the available arsenal of digital image forensics technology to detect image editing performed by state-of-the-art image-compositing techniques. By analyzing fundamental image patterns, forensics techniques can effectively detect the occurrence of most types of image compositing operations. In response to these two studies, the thesis presents an alternative approach to digital image forensics, based on automated plan generation. By treating the image inspection process as a plan comprised of different steps, it proposes an architecture that is able to guide an analyst choosing the next best step for inspecting an image. The generated plans are flexible, adapting on the fly to the observed results. The plans are based on a formal modelling of current forensics knowledge and techniques, so that they can be translated in steps to be executed. The thesis then shows that the limits of such an approach lie in the difficulty to validate results, which is a consequence of the setup of forensics problems: they are problems of distributed trust among parties with limited information. This scenario is analyzed from different perspectives in search for the practical limits of Digital Image Forensics as a whole. The results of such an analysis suggest that the field is lacking in providing practical and accessible solutions to society due to limited engagement in multidisciplinary research rather than due to limited technical proficiency. The thesis then discusses how paradoxes from philosophy, mathematics, and epistemology arise naturally in both real forensics scenarios, and in the theoretical foundations of the field. Digital Image Forensics ultimately deals with human communication and, as such, it is subject to all its complexities. Finally, it is argued that the path for providing useful solutions for society requires a collective engagement from different disciplines. It is the responsibility of the forensics community to develop a common, accessible epistemological framework for this collective enterprise.
APA, Harvard, Vancouver, ISO, and other styles
10

Alhadad, Nagham. "Bridging the gap between social and digital works : system modeling and trust evaluation)." Nantes, 2014. http://archive.bu.univ-nantes.fr/pollux/show.action?id=9f95fd53-f840-42e5-aef8-42fe66c89199.

Full text
Abstract:
Aujourd’hui, les systèmes numériques sont interconnectés au travers d’architectures complexes. Les participants à ces systèmes réalisent activités telles que communiquer ou partager des données. Humains, matériels et logiciels sont impliqués dans ces activités, de sorte qu’un système peut être décrit comme la représentation de deux mondes, le monde social et le monde numérique et leurs relations. L’évaluation de ces systèmes est limitée aux aspects techniques. Aujourd’hui, la confiance envers les est devenue un facteur important dans les procédures d’évaluation. Dans ce contexte, nous soulevons deux questions : comment formaliser les entités composant un système ainsi que leurs relations pour une activité particulière ? et comment évaluer la confiance envers un système pour cette activité ? Nos contributions sont divisées en deux parties. La première partie propose un métamodèle formel, nommé SocioPath, qui permet de modéliser un système avec les entités du monde social et numérique et leurs relations. La deuxième partie consiste à évaluer la confiance des utilisateurs envers les systèmes qu’ils utilisent pour une activité donnée. Nous proposons une approche, nommé SocioTrust permettant de calculer le niveau de confiance, qui utilise la théorie des probabilités. Puis nous proposons une seconde approche, sous le nom de SubjectiveTrust, pour prendre en compte l’incertitude dans les valeurs de confiance, cette approche se basant sur la logique subjective
Nowadays, digital systems are connected through complex architectures. Participants to these systems perform activities like chatting or sharing data. Persons, physical and digital resources are involved in these activities, such that a system can be considered as a representation of two worlds, the social world and the digital world and their relations. Evaluating these systems is generally limited to technical aspects. Today, trust becomes an important key in the evaluation process. In this context, we raise two questions: how to formalize the entities that compose a system and their relations for a particular activity? and how to evaluate trust in a system for this activity? Our contributions are divided into two parts. The first part proposes a formal metamodel named SocioPath, to model a system with all entities of social and digital worlds and their relations. The second part evaluates the users’ trust in the systems they use for a given activity. We propose an approach named, SocioTrust, to compute the user’s trust in a system using probability theory. Then we propose a second approach named, SubjectiveTrust that takes into account the uncertainty in the trust values. This approach is based on subjective logic
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Trust (digital)"

1

Paliszkiewicz, Joanna, Kuanchin Chen, and Markus Launer. Trust and Digital Business. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003266525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paliszkiewicz, Joanna, José Luis Guerrero Cusumano, and Jerzy Gołuchowski. Trust, Digital Business and Technology. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003266495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paliszkiewicz, Joanna, and Kuanchin Chen. Trust, Organizations and the Digital Economy. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003165965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osburg, Thomas, and Stephanie Heinecke, eds. Media Trust in a Digital World. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30774-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fischer-Hübner, Simone, Stevel Furnell, and Costas Lambrinoudakis, eds. Trust and Privacy in Digital Business. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katsikas, Sokratis, Javier Lopez, and Günther Pernul, eds. Trust and Privacy in Digital Business. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b99832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fischer-Hübner, Simone, Costas Lambrinoudakis, Gabriele Kotsis, A. Min Tjoa, and Ismail Khalil, eds. Trust, Privacy and Security in Digital Business. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86586-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Katsikas, Sokratis, and Steven Furnell, eds. Trust, Privacy and Security in Digital Business. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17926-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fischer-Hübner, Simone, Sokratis Katsikas, and Gerald Quirchmayr, eds. Trust, Privacy and Security in Digital Business. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32287-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eckert, Claudia, Sokratis K. Katsikas, and Günther Pernul, eds. Trust, Privacy, and Security in Digital Business. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09770-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trust (digital)"

1

Rennie, Frank, and Keith Smyth. "Trust." In Digital Learning: The Key Concepts, 144. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eller, Eric, and Christine Hennighausen. "Digital Trust Management." In Digitalisierung in Industrie-, Handels- und Dienstleistungsunternehmen, 373–91. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43441-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Slama, Dirk. "Trust & Security." In The Digital Playbook, 327–35. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-88221-1_25.

Full text
Abstract:
AbstractDigital Trust (or trust in digital solutions) is a complex topic. When do users deem a digital product truly trustworthy? What if a physical product component is added, as in smart, connected products? While security is certainly a key enabler of Digital Trust, there are many other aspects that are important, including ethical considerations, data privacy, quality and robustness (including reliability and resilience). Since AIoT-enabled products can have a direct, physical impact on the well-being of people, safety also plays an important role (Fig. 28.1).
APA, Harvard, Vancouver, ISO, and other styles
4

Pernul, Günther. "Trust for Digital Products." In E-Commerce and Web Technologies, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45229-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Launer, Markus, Frithiof Svenson, Fatih Çetin, and Piotr Pietrzak. "Intuition and Digital Trust in Virtual Organizations: Toward Digital Intuition." In Trust and Digital Business, 34–46. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003266525-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holmes, Marcus, and Nicholas J. Wheeler. "Can you Trust in Zoom? Bonds and Trust in Digital Spaces." In Digital International Relations, 99–120. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003437963-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Puertas, Alejandro Moreno, and Robin Teigland. "The trust revolution." In Digital Transformation and Public Services, 277–92. Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429319297-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Crane, Stephen, Siani Pearson, and Dieter Sommer. "Introduction: Privacy, Trust, and Identity Management." In Digital Privacy, 141–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bizer, Johann. "Voraussetzungen und Bedingungen für die rechtliche Anerkennung digital signierter Dokumente." In Trust Center, 26–39. Wiesbaden: Vieweg+Teubner Verlag, 1995. http://dx.doi.org/10.1007/978-3-322-90137-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Betton, Victoria. "The Jeopardy of Trust." In Towards a Digital Ecology, 139–61. Boca Raton: Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781032198798-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trust (digital)"

1

Gerth, Sebastian, and Lars Heim. "Trust through Digital Technologies." In ICBCT'20: 2020 The 2nd International Conference on Blockchain Technology. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3390566.3391662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Corbett, Eric, and Christopher A. Le Dantec. "Exploring Trust in Digital Civics." In DIS '18: Designing Interactive Systems Conference 2018. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196709.3196715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gabor, Andras. "Trust and the Digital Transformation." In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, 2019. http://dx.doi.org/10.1109/skima47702.2019.8982511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michetti, Giovanni. "Preservation as a Service for Trust (PaaST)." In 2015 Digital Heritage. IEEE, 2015. http://dx.doi.org/10.1109/digitalheritage.2015.7419550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Minami, Daichi, and Taketoshi Ushiama. "Can you trust the user?: Collaborative trust estimation model for recommendations." In 2017 Twelfth International Conference on Digital Information Management (ICDIM). IEEE, 2017. http://dx.doi.org/10.1109/icdim.2017.8244681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xiangkun Dai, Caiyi Zhu, and Yucui Guo. "P2P dynamic trust management system based on trust network." In 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, 2012. http://dx.doi.org/10.1109/cybersec.2012.6246132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

D.R., Adegbenro, V. Nwaocha, O. B. Longe, and A. O. Okunoye. "Privacy Trust Framework for Evaluation of Security Breaches in Digital Learning Environment – Research in Progress." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p31.

Full text
Abstract:
Our research focus is to identify privacy concern as a factor that influence learners trusts in online learning environments. We intend to elucidate and provide a framework that can assist institutions and instructors who design and implement e-learning platforms and online courses to address these concerns. The essence of the proposed framework is to serve as an evaluation tool for assessing security breaches in digital learning environments using appropriate theoretical. Keywords: Privacy, Trust Framework, Evaluation, Security Breaches, Digital Learning Environment
APA, Harvard, Vancouver, ISO, and other styles
8

Demirci, Mehmet Utku, and Pinar Karagoz. "Trust Modeling in Recommendation." In MEDES '21: International Conference on Management of Digital EcoSystems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3444757.3485105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cioroaica, Emilia, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider. "Goals within Trust-based Digital Ecosystems." In 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES). IEEE, 2021. http://dx.doi.org/10.1109/sesos-wdes52566.2021.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Veselov, Iurii Vitalevich, and Mariia Vladimirovna Belova. "Trust in the Digital Economy Society." In All-Russian scientific and practical conference with international participation. Publishing house Sreda, 2021. http://dx.doi.org/10.31483/r-99202.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trust (digital)"

1

Byrne, Dorothy, Rachel Gibson, John Ainsworth, Niels Peek, Gerard Hodgkinson, Margarita Panayiotou, Nicholas Lord, et al. On Digital Trust: Analysis and ideas on trust and security in a digital age. The University of Manchester, November 2019. http://dx.doi.org/10.3927/176490437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pfeiffer, Simon, and Randolf Carr. Error 404 - Trust Not Found: A European Survey on Digital (Dis)trust. Munich Security Conference, March 2021. http://dx.doi.org/10.47342/refq1817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Qadeer, and Vishnu Renganathan. Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, April 2024. http://dx.doi.org/10.4271/epr2024009.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Given the rapid advancements in engineering and technology, it is anticipated that connected and automated vehicles (CAVs) will soon become prominent in our daily lives. This development has a vast potential to change the socio-technical perception of public, personal, and freight transportation. The potential benefits to society include reduced driving risks due to human errors, increased mobility, and overall productivity of autonomous vehicle consumers. On the other hand, the potential risks associated with CAV deployment related to technical vulnerabilities are safety and cybersecurity issues that may arise from flawed hardware and software.</div><div class="htmlview paragraph"><b>Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles</b> elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. This report also highlights the importance of establishing robust cybersecurity protocols and fostering digital trust in these vehicles to ensure safe and secure deployment in our modern transportation system.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
4

Ong, Jonathan Corpus, Jeremy Tintiangko, and Rossine Fallorina. Human Rights in Survival Mode: Rebuilding Trust and Supporting Digital Workers in the Philippines. Technology and Social Change Research Project, June 2021. http://dx.doi.org/10.37016/tasc-2021-04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yilmaz, Ihsan, Shahram Akbarzadeh, and Galib Bashirov. Strategic Digital Information Operations (SDIOs). European Center for Populism Studies (ECPS), September 2023. http://dx.doi.org/10.55271/pp0024a.

Full text
Abstract:
In this paper, we introduce the concept of “Strategic Digital Information Operations” (SDIOs), discuss the tactics and practices of the SDIOs, explain the main political goals of state and non-state actors in engaging with SDIOs at home and abroad, and suggest avenues for new research. We argue that the concept of the SDIOs presents a useful framework to discuss all forms of digital manipulation at both domestic and international levels organized by either state or non-state actors. While the literature has examined the military-political impacts of the SDIOs, we still don’t know much about societal issues that the SDIOs influence such as emotive political mobilization, intergroup relations, social cohesion, trust, and emotional resonance among target audiences.
APA, Harvard, Vancouver, ISO, and other styles
6

SOLOVYANENKO, N. I. CROSS-BORDER BUSINESS OPERATIONS IN DIGITAL ECOSYSTEMS OF THE EAEU: LEGAL ISSUES. DOI CODE, 2021. http://dx.doi.org/10.18411/0131-5226-2021-70003.

Full text
Abstract:
Cross-border business operations in the digital ecosystems of the EAEU are carried out using electronic document management and the legal structure of the cross-border space of trust. Within the framework of the cross-border trust space, the legal structure of a trusted third party is used, which identifies participants in the electronic document flow; signs an electronic document with an electronic signature and verifies it; registers the date and time of sending and receiving an electronic document; and stores electronic documents. Special legal constructions are used to ensure the reliability of electronic document management.
APA, Harvard, Vancouver, ISO, and other styles
7

Buttigieg, Pier Luigi. Guidance on Versioning of Digital Assets. HMC Office, GEOMAR Helmholtz Centre for Ocean Research Kiel, 2022. http://dx.doi.org/10.3289/hmc_publ_04.

Full text
Abstract:
Versioning of data and metadata is a crucial - but often overlooked - topic in scientific work. Using the wrong version of a (meta)data set can lead to drastically difference outcomes in interpretation, and lead to substantial, propagating downstream errors. At the same time, past versions of (meta)data sets are valuable records of the research process which should be preserved for transparency and complete reproducibility. Further, the final version of (meta)data sets may actually include errors that previous versions did not. Thus, careful version control is the foundation for trust in and broad reusability of research and operational (meta)data. This document provides an introduction to the principles of versioning, technical recommendations on how to manage version histories, and discusses some pitfalls and possible solutions. In the first part of this document, we present examples of change processes that require proper management and introduce popular versioning schemes. Finally, the document presents recommended practices for researchers as well as for infrastructure developers.
APA, Harvard, Vancouver, ISO, and other styles
8

Noack, Anika. Knowledge and Technology Transfer under Digital Conditions: Transfer Intermediaries in Eastern Germany and the Role of Digital Means, Trust and Face-to-Face Interactions. Technische Hochschule Wildau, 2022. http://dx.doi.org/10.15771/innohub_4.

Full text
Abstract:
Even before the corona pandemic broke out in 2020, the role of digitalisation became more and more apparent within Knowledge and Technology Transfer (KTT) processes. Since the pandemic,intermediary organisations that bridge the distance between academia and the world of business to pave the way for successful university-industry linkages have not primarily been able to build on face-to-face-encounters to create those relations. Based on an ongoing research project, this paper examines how digitally mediated communications potentially enhance or limit knowledge and technology transfer that is primarily based on face-to-face interactions.On the one hand, the use of digitally mediated communications seem to foster the spatial expansion of networks, save travel times and costs and foster a special form of social inclusion. University-industry-relations, on the other hand,still rely on a positive evaluation of face-to-face contacts and geographical proximity for trust to develop between heterogeneous partners. Here, actors with bridging functions like transfer scouts are vital in enabling a regular communicative exchange to create commitment, social cohesion and cooperation in digital contexts. Although the relevance of digitalised transfer processes has been increasing over time, an important set of activities, involving face-to-face contacts and co-location, currently still plays a major role for transfer intermediaries in university-industry-relations.
APA, Harvard, Vancouver, ISO, and other styles
9

Busch, Ella, and Jacob Ware. The Weaponization of Deepfakes: Digital Deception on the Far-Right. ICCT, December 2023. http://dx.doi.org/10.19165/2023.2.07.

Full text
Abstract:
In an ever-evolving technological landscape, digital disinformation is on the rise, as are its political consequences. In this paper, we explore the creation and distribution of synthetic media by malign actors, specifically a form of artificial intelligence-machine learning (AI/ML) known as the deepfake. Individuals looking to incite political violence are increasingly turning to deepfakes–specifically deepfake video content–in order to create unrest, undermine trust in democratic institutions and authority figures, and elevate polarised political agendas. We present a new subset of individuals who may look to leverage deepfake technologies to pursue such goals: far-right extremist (FRE) groups. Despite their diverse ideologies and worldviews, we expect FREs to similarly leverage deepfake technologies to undermine trust in the American government, its leaders, and various ideological ‘out-groups.' We also expect FREs to deploy deepfakes for the purpose of creating compelling radicalising content that serves to recruit new members to their causes. Political leaders should remain wary of the FRE deepfake threat and look to codify federal legislation banning and prosecuting the use of harmful synthetic media. On the local level, we encourage the implementation of “deepfake literacy” programs as part of a wider countering violent extremism (CVE) strategy geared towards at-risk communities. Finally, and more controversially, we explore the prospect of using deepfakes themselves in order to “call off the dogs” and undermine the conditions allowing extremist groups to thrive.
APA, Harvard, Vancouver, ISO, and other styles
10

Yilmaz, Ihsan, Shahram Akbarzadeh, and Galib Bashirov. Comprehending the Tactics of Strategic Digital Disinformation Operations (SDIOs). European Center for Populism Studies (ECPS), September 2023. http://dx.doi.org/10.55271/pp0024.

Full text
Abstract:
In this paper, we introduce the concept of “Strategic Digital Information Operations” (SDIOs), discuss the tactics and practices of the SDIOs, explain the main political goals of state and non-state actors in engaging with SDIOs at home and abroad, and suggest avenues for new research. We argue that the concept of the SDIOs presents a useful framework to discuss all forms of digital manipulation at both domestic and international levels organized by either state or non-state actors. While the literature has examined the military-political impacts of the SDIOs, we still don’t know much about societal issues that the SDIOs influence such as emotive political mobilization, intergroup relations, social cohesion, trust, and emotional resonance among target audiences.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography