Dissertations / Theses on the topic 'Trust management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Trust management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ng, Peng Man. "Conflict management styles and trust." Thesis, University of Macau, 2006. http://umaclib3.umac.mo/record=b1637049.
Full textKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Full textHbaieb, Amal. "Trust Based Management for V2X." Electronic Thesis or Diss., Troyes, 2024. http://www.theses.fr/2024TROY0002.
Full textThe Internet of Vehicles (IoV) opens up new requirements regarding security, privacy, and trust provisioning. This raises the research question of how trust may be concurrently considered during the design of security solution for the IoV. This thesis addresses this question by designing an IoV security framework that maintains the trust between involved actors. We first propose a trust and Blockchain based framework that relies on reputation and location metrics to validate trustworthiness of the communication system. The Blockchain is leveraged to protect derived trust information from tamper. Next, we extend the proposed framework to better take into account the QoS while enforcing security. We use a clustering scheme to construct the extended framework. Besides, we propose to detect untrustworthy nodes through a lightweight federated learning-based Intrusion Detection System (IDS). We adopt the Software-Defined Networking (SDN)-IoV infrastructure to the network to build the collaborative IDS. The trust features-based detection is proposed along with the SDN to enable a QoS-aware IDS. After that, we proceed to improve the trust-based IDS. We apply multi cluster head concept to boost local detection and overall network performances. Finally, we suggest a reactive Unmanned Aerial Vehicle (UAV)-aided routing solution with security and QoS trade-off. We produce an IoV-UAV_Fog framework for the UAV-aided IoV routing. The proposed routing consists of selecting the optimal UAV relay that maximizes both trust and QoS
Warren, Jimmie S. "Trust in immediate supervisor, trust in top management, organizational trust precursors| Predictors of organizational effectiveness." Thesis, University of Phoenix, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3583299.
Full textThe quantitative correlational research study addressed the problem of a lack of knowledge on the predictive nature or strength of the independent variables; trust in immediate supervisor, trust in top management, and organizational trust precursors for producing organizational effectiveness (OE) that can also lead to a sustainable competitive advantage. The study was conducted on a research division of a federal government agency via electronic survey format. The study revealed that in addition to significant and positive correlations among the trust and OE variables, the results of a multiple regression analysis for the model as a whole showed an adjusted R2 value of .6630, indicating that 66.3% of the variation in the dependent variable, OE, was explained by the independent variables. An F-value of 134.8, significant at the .05 level (p-value < .0001), indicated that the overall regression model was a good fit. All three levels of trust experienced by subordinate employees were positive and significant predictors of OE. Hierarchical multiple regression also showed that organizational trust precursors (Ba = .379, βb = .573, t-value = 8.310, and p-value < .0001), and not trust in top management (Ba = .096, βb = .128, t-value = 1.970, and p-value = .0508) or trust in immediate supervisor (B a = .120, βb = .245, t-value = 5.370, and p-value < .0001) was a stronger positive predictor of OE. Managers and supervisors will be able to gain practical knowledge that will aid in positive and productive interactions with subordinate employees within organizations.
Rashad, Hisham S. M. "Trust Management Systems: Reference Architecture and Personalization." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88457.
Full textPHD
Evans, William. "Trust in Japanese management and culture." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00873698.
Full textYao, Walt Teh-Ming. "Trust management for widely distributed systems." Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619710.
Full textAlgamdi, A. A. "Enhancing trust management in cloud computing." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3019119/.
Full textJiang, Tao. "Distributed trust management in autonomic networks." College Park, Md.: University of Maryland, 2007. http://hdl.handle.net/1903/7769.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ba-Hutair, Mohammed Nasser Mohammed. "TRUST MANAGEMENT OF CROWDSOURCED IOT SERVICES." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/26939.
Full textZHU, Peihu. "An improved model for trust-aware recommender systems based on multi-faceted trust." Digital Commons @ Lingnan University, 2016. https://commons.ln.edu.hk/cds_etd/15.
Full textFouche, J. B. "Trust and business : an inquiry into the functioning of trust in business." Thesis, Stellenbosch : Stellenbosch University, 2006. http://hdl.handle.net/10019.1/20838.
Full textENGLISH ABSTRACT: The last decade has seen a continuing erosion of trust in business. Companies inability to realise trust in practice has created public cynicism and mistrust. This eruption of mistrust compelled business to ask why trust has become as issue of concern and how one can re-establish trust in commerce. The study will investigate the functioning of the concept of trust in business. Our hypothesis is that a move from mistrust to trust in the current business environment is only possible through a change in our understanding of ethics. A mere change in business processes or a tightening of corporate governance and compliance will not help us to move away from the culture of suspicion that is negatively influencing our business environment. We will propose the work of Emmanuel Levinas as an ethical alternative to the de-ontological and teleological approaches that are currently dominating our understanding of business ethics. Using some of his key concepts we construct what we call an 'embodied trust'. This form of trust is grounded in responsibility towards the other, and not in the rational sentiments of the egotistical subject. We complement this more philosophical approach to trust by building a business case for it by looking at the way it functions in various business instances. We acknowledge that a lot of what we have discussed is already an implicit part of what is happing in the business community. By looking at issues such as integrity, transparency I leadership, corporate culture, stakeholders, corporate social responsibility, branding and corporate governance, we highlight the existing forms of trust that already adhere to the discussed ethical requirements, and indicate the direction that business needs to take to cultivate this kind of trust in all its business processes. We conclude our study by giving two examples that will serve as illustration of our argument. The first being Regal Bank as an example of 'embodied mistrust' and the second being Allan Gray as an illustration of 'embodied trust'.
AFRIKAANSE OPSOMMING: Die laaste dekade is gekenmerk deur 'n voortdurende erosie van vertroue in die sakewereld. Maatskappye se onvermoe om in die praktyk vertroue te skep, het verder bygedra tot openbare sinisme en wantroue in sakepraktyke. Hierdie ontploffing van wantroue het organisasies genoop om te besin oor waarom vertroue so 'n belangrike kwessie is, en oor hoe om dit te herstel. Hierdie studie . ondersoek die wyse waarop die konsep van vertroue in besigheid funksioneer. Dns hipotese is dat die verskuiwing van wantroue na vertroue in die heersende besigheidsomgewing aileen moontlik is deur 'n veranderde begrip van etiek. Die blote verandering in besigheidsprosesse of 'n verskerping van korporatiewe beheer en nakoming van reels sal cns nie help om weg te beweeg van 'n kultuur van agterdog wat besig is om cns besigheidsmilieu negatief te be"(nvloed nie. Ons stel die werk van Emmanuel Levinas as 'n etiese alternatief voar om die de-ontologiese en teleologie5e benaderings te vervang wat tans cns beg rip van besigheidsetiek oorheers. Deur van sy sleutelbegrippe te gebruik, konstrueer ons wat ons noem 'n 'beliggaamde vertroue'. Hierdie vorm van vertroue is gegrond in verantwoordelikheid teenoor die ander en nie in die rasionele trekke van die egotisiese subjek nie. Ons komplementeer ons filosofiese benadering tot vertroue met 'n praktiese kyk op hoe dit funksioneer in verskillende besigheidsprosesse. Baie van dit wat ons bespreek, is reeds implisiet deel van dit wat gebeur in die bre;; besigheidsgemeenskap. Deur te kyk na sake soos integriteit, deursigtigheid, leierskap, korporatiewe kultuur, belanghebbendes, korporatiewe sosiale verantwoordelikheid, handelsmerke en korporatiewe beheer, wys ons uit hoe bestaande vorme van vertroue reeds voldoen aan ons voorgestelde etiese voorwaardes. Hiermee saam gee ons ook die rigting aan waarin besigheid moet ontwikkel om die tipe vertroue deel te maak van al sy besigheidsprosesse. Ons sluit die studie af deur twee voorbeelde te gee ter illustrasie van ons argument. Die eerste is die van Regal Bank as 'n voorbeeld van ' beliggaamde wantroue' en die tweede is die van Allan Gray as 'n illustrasie van 'beliggaamde vertroue'.
Dong, Changyu. "Non-monotonic trust management for distributed systems." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505456.
Full textChu, Yang-hua. "Trust management for the World Wide Web." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43534.
Full textIncludes bibliographical references (leaves 62-[63]).
by Yang-hua Chu.
M.Eng.
Zuppa, Diodoro. "Model for developing trust in construction management." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024734.
Full textYang, Seokwon. "Security and trust management in collaborative computing." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002375.
Full textKreikenberg, Alexander H. "A framework for customer trust measurement." Thesis, University of Gloucestershire, 2013. http://eprints.glos.ac.uk/1330/.
Full textMohan, Raj. "XML based adaptive IPsec policy management in a trust management context." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/4824.
Full textTCP/IP provided the impetus for the growth of the Internet and the IPsec protocol now promises to add to it the desired security strength. IPsec provides users with a mechanism to enforce a range of security services for both confidentiality and integrity, enabling them to securely pass information across networks. Dynamic parameterization of IPsec further enables security mechanisms to adjust the level of security service "on-the-fly" to respond to changing network and operational conditions. The IPsec implementation in OpenBSD works in conjunction with the Trust Management System, KeyNote, to achieve this. However the KeyNote engine requires that an IPsec policy be defined in the KeyNote specification syntax. Defining a security policy in the KeyNote Specification language is, however, extremely difficult and the complexity of the language could lead to incorrect specification of the desired policy, thus degrading the security of the network. This thesis looks into an alternative XML representation of this language and a graphical user interface to evolve a consistent and correct security policy. The interface has the simplicity of a simple menu-driven editor that not only provides KeyNote with a policy in the specified syntax but also integrates techniques for correctness verification and validation.
Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Timothy E. Levin. Includes bibliographical references (p. 71-72). Also available online.
Rurick, Peter G. "Building trust in e-commerce." Master's thesis, University of Cape Town, 2002. http://hdl.handle.net/11427/9766.
Full textThis study primarily investigates the processes and capabilities which are important for building and developing trust in e-Commerce. The main area of focus of this study is on the factors and enablers which can be applied by online retailers to build trust and communicate trustworthiness to online consumers. Throughout the study these factors and enablers are commonly referred to as the 'building blocks of trust in e-Commerce'. It is argued that without trust, e-Commerce cannot reach its full potential and that the building blocks of trust in e-Commerce can be applied to build and develop trust in e-Commerce. This study further investigates consumer perceptions of e-Commerce, and the deterrents to online shopping. Special emphasis was placed on important e-Commerce issues, central to building and developing trust in e-Commerce, such as privacy, security and fulfilment. As part of the recommendations, a conceptual model for building trust In e-Commerce is presented, which maps out the online trust building process with the general building blocks of trust in e-Commerce at its core.
Xiong, Li. "Resilient Reputation and Trust Management: Models and Techniques." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7483.
Full textSkogsrud, Halvard Computer Science & Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.
Full textSmith, Christopher David Ph D. Massachusetts Institute of Technology. "Enhancing trust in US nuclear waste management institutions." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118075.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 353-399).
The failure of US policymakers to develop a permanent geological disposal solution has led to the accumulation of spent nuclear fuel and high-level radioactive waste material at nuclear power plants and former weapons manufacturing facilities. This situation poses a growing long-term public safety hazard, and it hampers the possibility of a revival of commercial nuclear power generation for electricity decarbonization. Policymakers have struggled to resolve the nuclear waste management problem in the face of determined opposition from state governments and some host communities. At present we have a policy process stalemate. A key factor contributing to the stalemate has been a deficiency of public trust in nuclear waste management institutions. I argue that nuclear waste management institutions, such as the Department of Energy, have inspired distrust as a result of behavior that has undermined public perceptions of their trustworthiness, including their competence and fairness. In exploring parallel policy system cases involving high levels of complexity, uncertainty, and risk, I find that strong consent regimes produce three approaches to achieving public consent: coercion, cooperation, and concession. Policy systems with relatively weak consent regimes allow governance institutions to exercise greater autonomy but at risk of losing legitimacy. I argue that the cooperation approach is the best fit for pursuing public consent for high-level nuclear waste policies, and that institutional trust makes the cooperation approach more effective. I propose the adoption of a national "trust strategy" to enhance trust in nuclear waste management institutions by demonstrating and promoting institutional trustworthiness. Repairing damaged trust will be as important a strategic objective as building new levels of trust.
by Christopher David Smith.
Ph. D. in Public Policy and Planning
Beder, Ahmed Aly. "Trust Management for A Decentralized Service Exposure Marketplace." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285520.
Full textDet är ett utmanande problem att möjliggöra förtroende mellan enheter för attsamarbeta, utan nödvändighet av en tredjepartsförmedlare. Detta problem belysesnär samarbetet innebär en komplicerad process, spänner över flera system ochomfattar ett stort antal enheter. Detta är fallet i en decentraliserad marknadsplatsför exponering av tjänster. I detta arbete designar och implementerar vi en PoCkollektionav tjänster för att möjliggöra en blockchain till att bli en förankring fören decentraliserad marknadsplats för serviceexponering. Vi formaliserar först denödvändiga kraven för att möjliggöra förtroende mellan ett konsortium av enhetersom är värd för marknadplatsen. Vi följer sedan med en hotmodell mot detidentifierade kravet, och belyser feluppförande från de olika enheterna. Slutligenföreslår vi en modell, Trust Engine, som underlättar förtroendeshanteringsprocessenoch mildrar de identifierade hoten. Vi presenterar ett konceptvalidering av vårmodell med en kombination av smarta kontrakt (hyperledger fabric), blockchain ochservicenätsteknologi (Istio). Trust Engine identifierar feluppförandet, dokumenterardet i blockkedjan och verkställer riktlinjer för att fixa feluppförandet. Vidareundersökte vi varje komponent i vårt föreslagna system för att identifiera flaskhalsenför prestanda. Slutligen diskuterar vi begränsningarna i vår föreslagna modell medavseende på andra modeller för distribution av servicenät samt potentiellt framtidaarbete och förbättringar.
Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.
Full textAlonaizi, Ahmad. "Continuous trust management frameworks : concept, design and characteristics." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3876.
Full textAlhaqbani, Bandar Saleh. "Privacy and trust management for electronic health records." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37635/1/Bandar_Alhaqbani_Thesis.pdf.
Full textMaijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.
Full textYritysten välinen luottamus on yhä tärkeämpää toimitusketjuihin osallistuvien organisaatioiden keskuudessa, missä uhat syntyvät yritysten tietoturvakontrollien ulkopuolelta. Sama ongelma kohdataan kyberturvallisuudessa, missä uhkataso kasvaa muutoksista organisaatiorajojen ulkopuolella. Jokaisen toimitusketjuun osallistuvan on suojauduttava. Luottamuksen rakentamisen tehtävä on kaikkien jäsenien yhteinen asia luottamusverkostossa. Toimitusketjuun osallistuvien on rakennettava organisaatioiden välinen luottamus ennen liiketoiminnan aloittamista. Tässä tutkimuksessa tarjotaan keinoja kehittää organisaatioiden välistä luottamusta tietoturvallisuuden hallintajärjestelmän toteuttamisessa. Tietoturvallisuuden hallintajärjestelmä koostuu prosessien, dokumentaation, toimintojen ja resurssien yhdistelmästä, mitkä yhdessä turvaavat tietovarannot organisaation sisällä. Se on koostettava tukemaan liiketoiminnan strategisia tavoitteita ja täyttää valitut kriteeristöt. Koska tietoturvallisuuden hallintajärjestelmiä sertifioidaan eri tavalla, sekä eri tarkoituksia varten, niin sertifioitu standardi ei itsessään takaa turvallisia liiketoimintaprosesseja, vaan se toimii hyvänä lähtöpisteenä luottamuksen rakentamiselle. Tässä tutkimuksessa sovellettiin kirjallisuuskatsausta yritysten välisten luottamusta edistävien ja estävien elementtien löytämiseksi, mitä tietoturvallisuuden hallintajärjestelmän toteutuksessakin voitaisiin soveltaa. Tutkimus toteutettiin rajatulla alueella tietojenkäsittely-, käyttäytymis-, sekä hallintotieteiden yhtymäkohdassa. Tutkimus löysi useita elementtejä (102), mitkä huomioimalla tietoturvallisuuden hallintajärjestelmässä voidaan vaikuttaa yritysten välisen luottamuksen rakentamiseen. Löydökset jaoteltiin ISO/IEC 27001 (2013) tietoturvallisuuden hallintajärjestelmän toteutusaskelien mukaisesti, jotta tulokset tukisivat parhaiten tietoturvallisuuden asiantuntijaa konkreettisella tasolla. Tutkimuspapereita ei ole yhtään, tai niitä on hyvin rajoitetusti missä tietoturvallisuuden hallintajärjestelmän ja yritysten välisen luottamuksen rakentaminen yhdistetään. Monitieteinen tietoturvan ilmiö yhdistettynä yritysten välisen luottamuksen rakentamiseen vaatii enemmän huomiota tiedeyhteisöltä. Tietoturvallisuutta kouluttavien oppilaitosten tulisi kehittää tietoturvallisuuden kurssitarjontaansa tukemaan monitieteellistä lähestymistapaa ei vain oman tutkimusalan näkökulmaa, jotta teollisuus saisi sopivampia resursseja käyttöönsä
Cousins, Thomas Daniel. "A climate of trust : exploring adaptation policy." Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/4840.
Full textThis paper aims to tease out and unpack the different value positions that inhere in the range of discourses and methods that currently permeate the field of climate change. In doing so, I will examine the underlying concepts, methods and their application by various actors and institutions.
Tomlinson, Edward C. "Cheap talk, valuable results? A causal attribution model of the impact of promises and apologies on short-term trust recovery." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1085062874.
Full textTitle from first page of PDF file. Document formatted into pages; contains xi, 184 p.; also includes graphics. Includes abstract and vita. Advisor: Roy J Lewicki, Labor and Human Resources Graduate Program. Includes bibliographical references (p. 144-157).
Albrecht, Simon L. "The dimensions and consequences of trust in senior management." Thesis, Curtin University, 2001. http://hdl.handle.net/20.500.11937/917.
Full textIsaeva, Nevena. "Trust and distrust in intra-organisational relationhips." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8616/.
Full textPosey, Jamison H. "Technology and trust : technology as impression management in trust development within outsourced information systems development projects /." Full text available from ProQuest UM Digital Dissertations, 2007. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=0&did=1609005771&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1245341846&clientId=22256.
Full textGouret, Camille. "L'administration fiduciaire : Contribution à l'étude de la fiducie." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTD052.
Full textIntroduced in the french law since ten years yet, the french trust, as know as « fiducie », keeps destabilising. While everything seems oppose that so-called fiduciary property and the real property, the doctrine preaches for assimilation. To manage the fiduciary estate, the trustee is said to own the whole power as a proprietor, but wich has to be straight away limited to spare the settler and the sestui que trust findind themeselves helpless in front of a powerfully trustee. Why then to prevail in this way ? Isn’t it possible to deal with others mechanism of the legal arsenal instead of altering it ? Doubtlessly, a positive answer has to be given. To focus attention on the allocation (affectation) and to depart from the beaten tracks, allow to take back the trustee his rightful palce : he is an estate manager provided with inherent powers. The analyse suggested succeed in explaining the legal regime, clarifying doubts and increasing effectiveness thanks to means for settler and sestui que trust to deal with a careless trustee
Wennblom, Gabriella. "Mapping management accounting and trust : an extended literature review." Doctoral thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-26507.
Full textKenning, Peter. "Customer Trust Management : ein Beitrag zum Vertrauensmanagement im Lebensmitteleinzelhandel /." Wiesbaden : Dt. Univ.-Verl, 2002. http://www.gbv.de/dms/zbw/356107175.pdf.
Full textAtkinson, Roger. "Information system's project management and the phenomenon of trust." Thesis, Bournemouth University, 2004. http://eprints.bournemouth.ac.uk/364/.
Full textReighard, Daniel K. II. "Incorporating trust into Department of Defense acquisition risk management." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43986.
Full textRisk management has been proven to be a valuable tool to identify and mitigate risks early in the program life-cycle. Modernization and communication advances have recently changed the commercial economy from national to global. Companies are starting to venture into new partnerships with foreign companies. However, there has also been an increase in business corruption, like Fannie Mac and Enron, which has raised skepticism in entering new partnerships. Industry is addressing this fact by no longer exclusively depending on science as the determining factor in risk assessment and starting to include trust as a factor in risk management. Qualitative measurements are being analyzed in attempted to address these uncertainties by incorporating trust into the risk management process. The purpose of this paper was to determine whether it was feasible and advantageous to incorporate trust into the risk management process for Department of Defense (DOD) acquisition. The premise of this research was that there were hidden risk factors attributed to qualitative measures that were not being identified in current DOD risk management processes. A preliminary conclusion of this thesis is that trust is a valuable factor in the risk assessment process that can help identify qualitative risk elements.
Bao, Fenye. "Dynamic Trust Management for Mobile Networks and Its Applications." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23157.
Full textThe dissertation research provides new understanding of dynamic trust management for mobile wireless networks. We gain insight on the best trust composition and trust formation out of social and QoS trust components, as well as the best trust aggregation and propagation protocols for optimizing application performance. We gain insight on how a modeling and analysis tool can be built, allowing trust composition, aggregation, propagation, and formation designs to be incorporated, tested and validated. We demonstrate the utility of dynamic trust management protocol for mobile networks including mobile ad-hoc networks, delay tolerant networks, wireless sensor networks, and Internet of things systems with practical applications including misbehaving node detection, trust-based survivability management, trust-based secure routing, and trust-based service composition. Through model-based analysis with simulation validation, we show that our dynamic trust management based protocols outperform non-trust-based and Bayesian trust-based protocols in the presence of malicious, erroneous, partly trusted, uncertain and incomplete information, and are resilient to trust related attacks.
Ph. D.
Coleman, Kimberly Jane. "The Role of Trust in Collaborative Natural Resource Management." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/64987.
Full textPh. D.
Zikhali, Precious. "Land reform, trust and natural resource management in Africa /." Göteborg : [Department of Economics, School of Economics and Commercial Law] : University of Gothenburg, 2008. http://hdl.handle.net/2077/18382.
Full textAlbrecht, Simon L. "The dimensions and consequences of trust in senior management." Curtin University of Technology, School of Psychology, 2001. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=13109.
Full textover a twelve month time period. Theoretical implications and the practical implications for the diagnosis and management of trust in senior management are discussed.
DeShaw, Michèle. "Trust, collegiality, and community /." dissertation online, 2009. http://pqdtopen.proquest.com/#abstract?dispub=3379005.
Full textMartucci, Leonardo, Sebastian Ries, and Max Mühlhäuser. "Sybil-FreePseudonyms, Privacy and Trust : Identity Management in the Internet of Services." Technische Universität Darmstadt, Telecooperation Lab (TK), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27767.
Full textLau, Hat-lan, and 劉克蘭. "Trust relations in the construction industry." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014917.
Full textDionysiou, Ioanna. "Dynamic and composable trust for indirect interactions." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/i%5Fdionysiou%5F072406.pdf.
Full textJohnson, Devon Samuel. "Cognitive and affective trust in service relationships." Thesis, London Business School (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299997.
Full textDaudi, Morice [Verfasser]. "Trust in Sharing Resources in Logistics Collaboration / Morice Daudi." Düren : Shaker, 2019. http://d-nb.info/1188552376/34.
Full textShabut, Antesar R. M. "Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/7501.
Full textMinistry of Higher Education in Libya and the Libyan Cultural Attaché bureau in London
Steyn, Esther. "Are unit trust performances inflated at quarter-ends." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53290.
Full textENGLISH ABSTRACT: Suspicion has long existed that the performance of unit trusts is artificially inflated at quarter-ends, as those are the periods focussed on in the press. Studies investigating this have been done in the USA, but to date no similar study has been done in South Africa. This study examines the daily net asset value (NAV) performances of South Africa's domestic equity funds for the period from 1996 to 2002, as obtained from the MoneyMate database. Specifically, returns in excess of the benchmark index at quarterends are compared to excess returns at other month ends. The benchmark index performance is subtracted to correct for movement in the market. Domestic equity funds are divided into nine sectors and in much of this study, the funds in a sector are examined collectively. Results show that unit trust performance does peak at year-ends and quarter-ends, with a subsequent drop at the start of years and quarters. Furthermore, more funds beat the JSE All Share Index at year-ends and quarter-ends, than is normally the case. In contrast, this pattern was not repeated in the percentage of funds beating zero. Following these results, tests were done to establish whether a relationship exists between an end-of-quarter positive return and a subsequent beginning-of-quarter negative return. The suspected relationship was confirmed specifically in the funds from the period from 2000 to 2002. From this study, it would appear that inflating unit trust performances at quarter-ends is not yet extinct in South Africa. Advice to potential investors would therefore be to invest at the beginning of a quarter and to sell at the end.
AFRIKAANSE OPSOMMING: Daar bestaan lank reeds die vermoede dat die opbrengste van effektetrusts op kwartaaleindes opwaarts bestuur word, siende dat dit die opbrengste is wat dekking in die media geniet. Daar is al in die VSA studies gedoen wat hierdie vermoede ondersoek, maar tot op hede was daar nog geen soortgelyke studie in Suid-Afrika nie. Hierdie studie ondersoek die daaglikse opbrengste van die netto batewaarde van Suid- Afrika se binnelandse effektetrusts vir die tydperk 1996 tot 2002, soos verkry van die databasis MoneyMate. Die verskil tussen opbrengste van die effektetrusts en die indeks op kwartaaleindes is vergelyk met die verskil op ander maandeindes (die verskil tussen opbrengste is geneem om bewegings in die mark in ag te neem). Plaaslike effektetrusts word in nege sektore verdeel, en in die grootste deel van hierdie studie word die effektetrusts in 'n sektor as 'n geheel ondersoek. Resultate toon dat effektetrusts opbrengste wel pieke toon op jaareindes en kwartaaleindes, en dan weer val in die begin van jare en kwartale. Verder is daar ook meer effektetrusts wat beter vaar as die JSE Alle Aandele Indeks op jaareindes en kwartaaleindes as wat normaalweg die geval is. In kontras word hierdie patroon nie herhaal as gekyk word na die persentasie van effektetrusts wat nul klop nie. Na aanleiding van hierdie resultate is toetse gedoen om vas te stel of daar 'n verband bestaan tussen positiewe opbrengste op kwartaaleindes en die daaropvolgende negatiewe opbrengste aan die begin van kwartale. Hierdie verband is veral gevind vir die tydperk 2000 tot 2002. Uit hierdie studie wil dit blyk dat, in Suid-Afrika, die opbrengste van effektetrusts op kwartaaleindes wel kunsmatig verhoog word. Raad aan voornemende beleggers sou dus wees om aan die begin van 'n kwartaal te koop, en aan die einde te verkoop.