Dissertations / Theses on the topic 'Trust management'

To see the other types of publications on this topic, follow the link: Trust management.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Trust management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ng, Peng Man. "Conflict management styles and trust." Thesis, University of Macau, 2006. http://umaclib3.umac.mo/record=b1637049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized trust evaluation architecture (without a separate infrastructure) within a platoon, and a method to develop trust in the communication between the fellow platoon members with the help of a feedback system in place which is used to evaluate the trust of the platoon members and the platoon leader on the vehicle which joins the platoon newly. This trust model has been implemented in the case of VANET’s initially, for the purpose of group leader selection this model also includes the concept of direct and indirect trust among the vehicles. The results obtained show that the stability and the performance of the platoon drastically improve in the case of a decentralized mechanism, compared to a normal platoon with general characteristics. Keywords: Trust management, Feedback system, Platoon, Decentralized architecture, VANET, Trust model.
APA, Harvard, Vancouver, ISO, and other styles
3

Warren, Jimmie S. "Trust in immediate supervisor, trust in top management, organizational trust precursors| Predictors of organizational effectiveness." Thesis, University of Phoenix, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3583299.

Full text
Abstract:

The quantitative correlational research study addressed the problem of a lack of knowledge on the predictive nature or strength of the independent variables; trust in immediate supervisor, trust in top management, and organizational trust precursors for producing organizational effectiveness (OE) that can also lead to a sustainable competitive advantage. The study was conducted on a research division of a federal government agency via electronic survey format. The study revealed that in addition to significant and positive correlations among the trust and OE variables, the results of a multiple regression analysis for the model as a whole showed an adjusted R2 value of .6630, indicating that 66.3% of the variation in the dependent variable, OE, was explained by the independent variables. An F-value of 134.8, significant at the .05 level (p-value < .0001), indicated that the overall regression model was a good fit. All three levels of trust experienced by subordinate employees were positive and significant predictors of OE. Hierarchical multiple regression also showed that organizational trust precursors (Ba = .379, βb = .573, t-value = 8.310, and p-value < .0001), and not trust in top management (Ba = .096, βb = .128, t-value = 1.970, and p-value = .0508) or trust in immediate supervisor (B a = .120, βb = .245, t-value = 5.370, and p-value < .0001) was a stronger positive predictor of OE. Managers and supervisors will be able to gain practical knowledge that will aid in positive and productive interactions with subordinate employees within organizations.

APA, Harvard, Vancouver, ISO, and other styles
4

Rashad, Hisham S. M. "Trust Management Systems: Reference Architecture and Personalization." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88457.

Full text
Abstract:
Trust is the cornerstone of success in any relationship between two or more parties. Generally, we do not socialize, seek advice, consult, cooperate, buy or sell goods and services from/to others unless we establish some level of mutual trust between interacting parties. When e-commerce was merging infancy, the concept of trusting an entity in a virtual world was a huge obstacle. Gradually, increasingly-sophisticated, largely generic reputation scoring and management systems were embedded into the evolving marketplaces. Current technologies to include cloud computing, social networking, and mobile applications, coupled with the explosion in storage capacity and processing power, are evolving large-scale global marketplaces for a wide variety of resources and services, such as Amazon.com, BitTorrent, WebEx and Skype. In such marketplaces, user entities, or users for short; namely, consumers, providers and brokers, are largely autonomous with vastly diverse requirements, capabilities and trust profiles. Users' requirements may include service quality levels, cost, ease of use, etc. Users' capabilities may include assets owned or outsourced. Trustors' profiles may include what is promised and commitments to keep these promises. In such a large-scale heterogeneous marketplace, the trustworthy interactions and transactions in services and resources constitute a challenging endeavor. Currently, solving such issues generally adopts a "one-size fits all" trust models and systems. Such approach is limiting due to variations in technology, conflicts between users' requirements and/or conflicts between user requirements and service outcomes. Additionally, this approach may result in service providers being overwhelmed by adding new resources to satisfy all possible requirements, while having no information or guarantees about the level of trust they gain in the network. Accordingly, we hypothesize the need for personalizable customizable Trust Management Systems (TMSs) for the robustness and wide-scale adoption of large-scale marketplaces for resources and services. Most contemporary TMSs suffer from the following drawbacks: • Oblivious to diversities in trustors' requirements, • Primarily utilize feedback and direct or indirect experience as the only form of credentials and trust computations, • Trust computation methodologies are generally hardcoded and not reconfigurable, • Trust management operations, which we identify as monitoring, data management, analysis, expectation management, and decision making, are tightly coupled. Such coupling impedes customizability and personalization, and • Do not consider context in trust computations, where trust perspectives may vary from a context to another. Given these drawbacks and the large scale of the global marketplace of resources and services, a reference architecture for trust management systems is needed, which can incorporate current systems and may be used in guidance and development of a wide spectrum of trust management systems ranging from un-personalized to fully personalized systems. Up to our knowledge, no TMS reference architecture exists in the literature. In this dissertation, we propose a new Reference Architecture for Trust Management (RATM). The proposed reference architecture applies separation of concern among trust management operations; namely, decision expectation, analytics, data management and monitoring. RATM defines trust management operations through five reconfigurable components which collectively can be used to implement a wide spectrum of trust management systems ranging from generic to highly personalized systems. We used RATM for trust personalization, where we propose a Personalized Trust Management System (PTMS) based on RATM. We evaluated PTMS's scalability and demonstrated its effectiveness, efficiency and resilience by contrasting against a Generic Trust Management System (GTMS). We used two case studies for our evaluations; namely, BitTorrent and a video conferencing application. Intellectual Merit In this work, we propose RATM, a reference architecture for trust management systems that can be used to implement a wide variety of trust management systems ranging from generic systems (un-personalized) to highly personalized systems. We assume service-based environment where consumers, brokers and service providers are interacting and transacting in services and resources to satisfying their own trust requirements. We used RATM to implement a personalized trust management system (TMS). The main contributions of this work are as follows: • Proposing RATM for the guidance and development of a wide spectrum of TMSs ranging from un-personalized to fully personalized systems, and • Utilizing our RATM to propose and implement a personalized, scalable TMS with varying trust computation models. Broader Impact RATM provides reference architecture for trust management which can be used to develop and evaluate a wide spectrum of TMSs. Personalization, in general, paves the road for reaching high levels of satisfaction, where interacting parties' requirements are individually considered and thus consumers are served the best suited service(s). Hence, we claim that PTMS would largely enhance large-scale heterogeneous systems offering services and resources. This could lead to more cooperation, more transactions, more satisfaction, less malicious behavior and lower costs.
PHD
APA, Harvard, Vancouver, ISO, and other styles
5

Evans, William. "Trust in Japanese management and culture." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00873698.

Full text
Abstract:
Japan, destroyed by an ill-fought war and risen to world power and yet again recently broken by natural and man-made phenomena, a nation intensely recognized the world over yet misunderstood, victim of its own exceptionalism, today needs to ask an old question. Will Japan participate in the international community as a full active member? Japan's involvement with the world was narrowly defined and confined to that of a trader and its image sustained by a self-proclaimed unique culture and all these today are put to the test. The trader's fundamental reliance on strictly cultural values to achieve success may today be insufficient to sustain their survival in a globalized world. Thus, the Japanese as well as foreigners question the validity of hitherto successful cultural tools such as loyalty in the context of globalized commerce
APA, Harvard, Vancouver, ISO, and other styles
6

Yao, Walt Teh-Ming. "Trust management for widely distributed systems." Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Algamdi, A. A. "Enhancing trust management in cloud computing." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3019119/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Tao. "Distributed trust management in autonomic networks." College Park, Md.: University of Maryland, 2007. http://hdl.handle.net/1903/7769.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Ba-Hutair, Mohammed Nasser Mohammed. "TRUST MANAGEMENT OF CROWDSOURCED IOT SERVICES." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/26939.

Full text
Abstract:
We propose a novel trust management framework for crowdsourced IoT services. The framework targets three main aspects: trust assessment, trust information credibility and accuracy, and trust information storage. First, trust assessment is achieved by leveraging machine-learning-based multi-perspective trust model that captures the inherent characteristics of IoT services. Additionally, we harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers' uses. For this, we propose a technique that detects the set of indicators that may influence trust for a given IoT service type. The indicators' significance is computed based on a given IoT consumer's usage pattern. The framework leverages the computed significance to provide a trust assessment tailored to IoT consumers. We propose memoryless just-in-time trust assessment; an approach for assessing trust without relying on historical records (memoryless) that exploits the service-session-related data (just-in-time). Second, our framework ascertains the credibility and accuracy of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the contextual fairness between IoT services and trust information. Third, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the integrity and availability of trust information.
APA, Harvard, Vancouver, ISO, and other styles
10

ZHU, Peihu. "An improved model for trust-aware recommender systems based on multi-faceted trust." Digital Commons @ Lingnan University, 2016. https://commons.ln.edu.hk/cds_etd/15.

Full text
Abstract:
As customers enjoy the convenience of online shopping today, they face the problem of selecting from hundreds of thousands of products. Recommender systems, which make recommendations by matching products to customers based on the features of the products and the purchasing history of customers, are increasingly being incorporated into e-commerce websites. Collaborative filtering is a major approach to design algorithms for these systems. Much research has been directed toward enhancing the performance of recommender systems by considering various psychological and behavioural factors affecting the behaviour of users, e.g. trust and emotion. While e-commerce firms are keen to exploit information on social trust available on social networks to improve their services, conventional trust-aware collaborative filtering does not consider the multi-facets of social trust. In this research, we assume that a consumer tends to trust different people for recommendations on different types of product. For example, a user trusts a certain reviewer on popular items but may not place as much trust on the same reviewer on unpopular items. Furthermore, this thesis postulates that if we, as online shoppers, choose to establish trust on an individual while we ourselves are reviewing certain products, we value this individual’s opinions on these products and we most likely will value his/her opinions on similar products in future. Based on the above assumptions, this thesis proposes a new collaborative filtering algorithm for deriving multi-faceted trust based on trust establishment time. Experimental results based on historical data from Epinions show that the new algorithm can perform better in terms of accuracy when compared with conventional algorithms.
APA, Harvard, Vancouver, ISO, and other styles
11

Fouche, J. B. "Trust and business : an inquiry into the functioning of trust in business." Thesis, Stellenbosch : Stellenbosch University, 2006. http://hdl.handle.net/10019.1/20838.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2006.
ENGLISH ABSTRACT: The last decade has seen a continuing erosion of trust in business. Companies inability to realise trust in practice has created public cynicism and mistrust. This eruption of mistrust compelled business to ask why trust has become as issue of concern and how one can re-establish trust in commerce. The study will investigate the functioning of the concept of trust in business. Our hypothesis is that a move from mistrust to trust in the current business environment is only possible through a change in our understanding of ethics. A mere change in business processes or a tightening of corporate governance and compliance will not help us to move away from the culture of suspicion that is negatively influencing our business environment. We will propose the work of Emmanuel Levinas as an ethical alternative to the de-ontological and teleological approaches that are currently dominating our understanding of business ethics. Using some of his key concepts we construct what we call an 'embodied trust'. This form of trust is grounded in responsibility towards the other, and not in the rational sentiments of the egotistical subject. We complement this more philosophical approach to trust by building a business case for it by looking at the way it functions in various business instances. We acknowledge that a lot of what we have discussed is already an implicit part of what is happing in the business community. By looking at issues such as integrity, transparency I leadership, corporate culture, stakeholders, corporate social responsibility, branding and corporate governance, we highlight the existing forms of trust that already adhere to the discussed ethical requirements, and indicate the direction that business needs to take to cultivate this kind of trust in all its business processes. We conclude our study by giving two examples that will serve as illustration of our argument. The first being Regal Bank as an example of 'embodied mistrust' and the second being Allan Gray as an illustration of 'embodied trust'.
AFRIKAANSE OPSOMMING: Die laaste dekade is gekenmerk deur 'n voortdurende erosie van vertroue in die sakewereld. Maatskappye se onvermoe om in die praktyk vertroue te skep, het verder bygedra tot openbare sinisme en wantroue in sakepraktyke. Hierdie ontploffing van wantroue het organisasies genoop om te besin oor waarom vertroue so 'n belangrike kwessie is, en oor hoe om dit te herstel. Hierdie studie . ondersoek die wyse waarop die konsep van vertroue in besigheid funksioneer. Dns hipotese is dat die verskuiwing van wantroue na vertroue in die heersende besigheidsomgewing aileen moontlik is deur 'n veranderde begrip van etiek. Die blote verandering in besigheidsprosesse of 'n verskerping van korporatiewe beheer en nakoming van reels sal cns nie help om weg te beweeg van 'n kultuur van agterdog wat besig is om cns besigheidsmilieu negatief te be"(nvloed nie. Ons stel die werk van Emmanuel Levinas as 'n etiese alternatief voar om die de-ontologiese en teleologie5e benaderings te vervang wat tans cns beg rip van besigheidsetiek oorheers. Deur van sy sleutelbegrippe te gebruik, konstrueer ons wat ons noem 'n 'beliggaamde vertroue'. Hierdie vorm van vertroue is gegrond in verantwoordelikheid teenoor die ander en nie in die rasionele trekke van die egotisiese subjek nie. Ons komplementeer ons filosofiese benadering tot vertroue met 'n praktiese kyk op hoe dit funksioneer in verskillende besigheidsprosesse. Baie van dit wat ons bespreek, is reeds implisiet deel van dit wat gebeur in die bre;; besigheidsgemeenskap. Deur te kyk na sake soos integriteit, deursigtigheid, leierskap, korporatiewe kultuur, belanghebbendes, korporatiewe sosiale verantwoordelikheid, handelsmerke en korporatiewe beheer, wys ons uit hoe bestaande vorme van vertroue reeds voldoen aan ons voorgestelde etiese voorwaardes. Hiermee saam gee ons ook die rigting aan waarin besigheid moet ontwikkel om die tipe vertroue deel te maak van al sy besigheidsprosesse. Ons sluit die studie af deur twee voorbeelde te gee ter illustrasie van ons argument. Die eerste is die van Regal Bank as 'n voorbeeld van ' beliggaamde wantroue' en die tweede is die van Allan Gray as 'n illustrasie van 'beliggaamde vertroue'.
APA, Harvard, Vancouver, ISO, and other styles
12

Dong, Changyu. "Non-monotonic trust management for distributed systems." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Chu, Yang-hua. "Trust management for the World Wide Web." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43534.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.
Includes bibliographical references (leaves 62-[63]).
by Yang-hua Chu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
14

Zuppa, Diodoro. "Model for developing trust in construction management." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Seokwon. "Security and trust management in collaborative computing." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kreikenberg, Alexander H. "A framework for customer trust measurement." Thesis, University of Gloucestershire, 2013. http://eprints.glos.ac.uk/1330/.

Full text
Abstract:
Purpose – The research on trust, and specifically on trust measurement, has increased significantly over recent years. Although the importance of trust has reached theoreticians, as well as practitioners, the conceptualization, and particularly the measurement, of trust is underexplored within the field of management science. In addition, most trust measurement instruments were designed to suit a specific purpose or situation and therefore are too narrow in focus. Thus, the aim of this study is to conceptualize an appropriate measurement approach for customer trust that improves the practicability of trust measurement for various organizational settings. The focus is therefore to develop an instrument relevant for practitioners, as well as for theoreticians. Design/methodology/approach – After a literature review on relationship management, customer retention and customer trust, this research identifies current shortcomings in trust measurement: chiefly that current trust measurements are not flexible enough to be applied to various customer situations. Following a pragmatist research philosophy, this research first integrates two well established models of trust measurement and secondly expands this to create a more flexible and nuanced framework and instrument of customer trust measurement. The instrument is designed to measure the current and expected level of customer trust, as well as the economic intention and intra-personal level of trust. Three large scale test are conducted in cooperation with three German-based companies, covering non-durable, durable goods and services categories. Various segmentation criteria are applied. With the help of statistical analysis the various level of trust are linked to the intra-personal level of trust, as well as the economic-intent of the customer. Findings – The results from the three large scale studies indicate that the customer trust measurement instrument produces robust results. The instrument can be adjusted to each company‘s needs to measure the current and expected levels of customer (and non-customer) trust. Furthermore the current and expected levels of trust can be measured on a factor-, dimensional- and overall basis. Various segmentation criteria related to target groups can be applied. The overall level of trust can be linked to the economic intention of a customer group, but the indications are too weak to link trust to the intra-personal level of customer trust. Originality/value – To the best of my knowledge, there is no customer trust measurement that combines the measurement of trust in an trust object (trust dimension) and trust characteristics (trust building factor) to provide one trust measurement scale. However, by combining these two entities a trust measurement instrument gains the necessary flexibility and nuance to be used in various situations to measure customer trust. This step seems to be adequate because recent research concluded that this would be the “conditio sine qua non” for a useful measurement in trust research. Furthermore, all previous models and instruments only measure the current level of customer trust and do not link the level of customer trust to economic intention.
APA, Harvard, Vancouver, ISO, and other styles
17

Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/4824.

Full text
Abstract:
Approved for public release, distribution is unlimited
TCP/IP provided the impetus for the growth of the Internet and the IPsec protocol now promises to add to it the desired security strength. IPsec provides users with a mechanism to enforce a range of security services for both confidentiality and integrity, enabling them to securely pass information across networks. Dynamic parameterization of IPsec further enables security mechanisms to adjust the level of security service "on-the-fly" to respond to changing network and operational conditions. The IPsec implementation in OpenBSD works in conjunction with the Trust Management System, KeyNote, to achieve this. However the KeyNote engine requires that an IPsec policy be defined in the KeyNote specification syntax. Defining a security policy in the KeyNote Specification language is, however, extremely difficult and the complexity of the language could lead to incorrect specification of the desired policy, thus degrading the security of the network. This thesis looks into an alternative XML representation of this language and a graphical user interface to evolve a consistent and correct security policy. The interface has the simplicity of a simple menu-driven editor that not only provides KeyNote with a policy in the specified syntax but also integrates techniques for correctness verification and validation.
APA, Harvard, Vancouver, ISO, and other styles
18

Mohan, Raj. "XML based adaptive IPsec policy management in a trust management context /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMohan.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science and M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Cynthia E. Irvine, Timothy E. Levin. Includes bibliographical references (p. 71-72). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
19

Rurick, Peter G. "Building trust in e-commerce." Master's thesis, University of Cape Town, 2002. http://hdl.handle.net/11427/9766.

Full text
Abstract:
Bibliography : leaves B1-B8.
This study primarily investigates the processes and capabilities which are important for building and developing trust in e-Commerce. The main area of focus of this study is on the factors and enablers which can be applied by online retailers to build trust and communicate trustworthiness to online consumers. Throughout the study these factors and enablers are commonly referred to as the 'building blocks of trust in e-Commerce'. It is argued that without trust, e-Commerce cannot reach its full potential and that the building blocks of trust in e-Commerce can be applied to build and develop trust in e-Commerce. This study further investigates consumer perceptions of e-Commerce, and the deterrents to online shopping. Special emphasis was placed on important e-Commerce issues, central to building and developing trust in e-Commerce, such as privacy, security and fulfilment. As part of the recommendations, a conceptual model for building trust In e-Commerce is presented, which maps out the online trust building process with the general building blocks of trust in e-Commerce at its core.
APA, Harvard, Vancouver, ISO, and other styles
20

Xiong, Li. "Resilient Reputation and Trust Management: Models and Techniques." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7483.

Full text
Abstract:
The continued advances in service-oriented computing and global communications have created a strong technology push for online information sharing and business transactions among enterprises, organizations and individuals. While these communities offer enormous opportunities, they also present potential threats due to a lack of trust. Reputation systems provide a way for building trust through social control by harnessing the community knowledge in the form of feedback. Although feedback-based reputation systems help community participants decide who to trust and encourage trustworthy behavior, they also introduce vulnerabilities due to potential manipulations by dishonest or malicious players. Therefore, building an effective and resilient reputation system remains a big challenge for the wide deployment of service-oriented computing. This dissertation proposes a decentralized reputation based trust supporting framework called PeerTrust, focusing on models and techniques for resilient reputation management against feedback aggregation related vulnerabilities, especially feedback sparsity with potential feedback manipulation, feedback oscillation, and loss of feedback privacy. This dissertation research has made three unique contributions for building a resilient decentralized reputation system. First, we develop a core reputation model with important trust parameters and a coherent trust metric for quantifying and comparing the trustworthiness of participants. We develop decentralized strategies for implementing the trust model in an efficient and secure manner. Second, we develop techniques countering potential vulnerabilities associated with feedback aggregation, including a similarity inference scheme to counter feedback sparsity with potential feedback manipulations, and a novel metric based on Proportional, Integral, and Derivative (PID) model to handle strategic oscillating behavior of participants. Third but not the least, we develop privacy-conscious trust management models and techniques to address the loss of feedback privacy. We develop a set of novel probabilistic decentralized privacy-preserving computation protocols for important primitive operations. We show how feedback aggregation can be divided into individual steps that utilize above primitive protocols through an example reputation algorithm based on kNN classification. We perform experimental evaluations for each of the schemes we proposed and show the feasibility, effectiveness, and cost of our approach. The PeerTrust framework presents an important step forward with respect to developing attack-resilient reputation trust systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Skogsrud, Halvard Computer Science &amp Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.

Full text
Abstract:
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular technology to connect applications both within and across enterprise boundaries. However, as services are increasingly used to implement critical functionality, security has become an important concern impeding the widespread adoption of SOA. Trust negotiation is an approach to access control that may be applied in scenarios where service requesters are often unknown in advance, such as for services available via the public Internet. Rather than relying on requesters' identities, trust negotiation makes access decisions based on the level of trust established between the requester and the provider in a negotiation, during which the parties exchange credentials, which are signed assertions that describe some attributes of the owner. However, managing the evolution of trust negotiation policies is a difficult problem that has not been sufficiently addressed to date. Access control policies have a lifecycle, and they are revised based on applicable business policies. Additionally, because a trust relationship established in a trust negotiation may be long lasting, their evolution must also be managed. Simply allowing a negotiation to continue according to an old policy may be undesirable, especially if new important constraints have been added. In this thesis, we introduce a model-driven trust negotiation framework for service-oriented applications. The framework employs a model for trust negotiation, based on state machines, that allows automated generation of the control structures necessary to enforce trust negotiation policies from the visual model of the policy. Our policy model also supports lifecycle management. We provide sets of operations to modify policies and to manage ongoing negotiations, and operators for identifying and managing impacts of changes to trust negotiation policies on ongoing trust negotiations. The framework presented in the thesis has been implemented in the Trust-Serv prototype, which leverages industry specifications such as WS-Security and WS-Trust to offer a container-centric mechanism for deploying trust negotiation that is transparent to the services being protected.
APA, Harvard, Vancouver, ISO, and other styles
22

Smith, Christopher David Ph D. Massachusetts Institute of Technology. "Enhancing trust in US nuclear waste management institutions." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118075.

Full text
Abstract:
Thesis: Ph. D. in Public Policy and Planning, Massachusetts Institute of Technology, Department of Urban Studies and Planning, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 353-399).
The failure of US policymakers to develop a permanent geological disposal solution has led to the accumulation of spent nuclear fuel and high-level radioactive waste material at nuclear power plants and former weapons manufacturing facilities. This situation poses a growing long-term public safety hazard, and it hampers the possibility of a revival of commercial nuclear power generation for electricity decarbonization. Policymakers have struggled to resolve the nuclear waste management problem in the face of determined opposition from state governments and some host communities. At present we have a policy process stalemate. A key factor contributing to the stalemate has been a deficiency of public trust in nuclear waste management institutions. I argue that nuclear waste management institutions, such as the Department of Energy, have inspired distrust as a result of behavior that has undermined public perceptions of their trustworthiness, including their competence and fairness. In exploring parallel policy system cases involving high levels of complexity, uncertainty, and risk, I find that strong consent regimes produce three approaches to achieving public consent: coercion, cooperation, and concession. Policy systems with relatively weak consent regimes allow governance institutions to exercise greater autonomy but at risk of losing legitimacy. I argue that the cooperation approach is the best fit for pursuing public consent for high-level nuclear waste policies, and that institutional trust makes the cooperation approach more effective. I propose the adoption of a national "trust strategy" to enhance trust in nuclear waste management institutions by demonstrating and promoting institutional trustworthiness. Repairing damaged trust will be as important a strategic objective as building new levels of trust.
by Christopher David Smith.
Ph. D. in Public Policy and Planning
APA, Harvard, Vancouver, ISO, and other styles
23

Beder, Ahmed Aly. "Trust Management for A Decentralized Service Exposure Marketplace." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285520.

Full text
Abstract:
Enabling trust between entities to collaborate, without the necessity of a third-partymediator is a challenging problem. This problem is highlighted when the collaborationinvolves a complicated process, spans multiple systems, and encompasses a largenumber of entities. This is the case in a decentralized service exposure marketplace.In this work, we design and implement a Proof-Of-Concept (PoC) suite of servicesto enable a blockchain to become the anchor of trust for a decentralized serviceexposure marketplace. We first formalize the necessary requirements to enable trustbetween a consortium of entities hosting the marketplace. We then follow with athreat model against the identified requirement, highlighting misbehaviour from thedifferent entities. Finally, we propose a model, Trust Engine, which facilitates thetrust management process and mitigates the identified threats. We showcase a proofof-concept of our model, utilizing a combination of smart contracts (hyperledgerfabric), blockchain, and service mesh technology (Istio). The Trust Engine successfullyidentifies the misbehaviour, documents it in the blockchain, and enforces policesto remediate the misbehaviour. Furthermore, we examined each component in oursuggested system to identify the performance bottleneck. Lastly, we discuss thelimitations of our suggested model with regards to other service mesh deploymentmodels as well as potential future work and improvements.
Det är ett utmanande problem att möjliggöra förtroende mellan enheter för attsamarbeta, utan nödvändighet av en tredjepartsförmedlare. Detta problem belysesnär samarbetet innebär en komplicerad process, spänner över flera system ochomfattar ett stort antal enheter. Detta är fallet i en decentraliserad marknadsplatsför exponering av tjänster. I detta arbete designar och implementerar vi en PoCkollektionav tjänster för att möjliggöra en blockchain till att bli en förankring fören decentraliserad marknadsplats för serviceexponering. Vi formaliserar först denödvändiga kraven för att möjliggöra förtroende mellan ett konsortium av enhetersom är värd för marknadplatsen. Vi följer sedan med en hotmodell mot detidentifierade kravet, och belyser feluppförande från de olika enheterna. Slutligenföreslår vi en modell, Trust Engine, som underlättar förtroendeshanteringsprocessenoch mildrar de identifierade hoten. Vi presenterar ett konceptvalidering av vårmodell med en kombination av smarta kontrakt (hyperledger fabric), blockchain ochservicenätsteknologi (Istio). Trust Engine identifierar feluppförandet, dokumenterardet i blockkedjan och verkställer riktlinjer för att fixa feluppförandet. Vidareundersökte vi varje komponent i vårt föreslagna system för att identifiera flaskhalsenför prestanda. Slutligen diskuterar vi begränsningarna i vår föreslagna modell medavseende på andra modeller för distribution av servicenät samt potentiellt framtidaarbete och förbättringar.
APA, Harvard, Vancouver, ISO, and other styles
24

Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Alonaizi, Ahmad. "Continuous trust management frameworks : concept, design and characteristics." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3876.

Full text
Abstract:
A Trust Management Framework is a collection of technical components and governing rules and contracts to establish secure, confidential, and Trustworthy transactions among the Trust Stakeholders whether they are Users, Service Providers, or Legal Authorities. Despite the presence of many Trust Frameworks projects, they still fail at presenting a mature Framework that can be Trusted by all its Stakeholders. Particularly speaking, most of the current research focus on the Security aspects that may satisfy some Stakeholders but ignore other vital Trust Properties like Privacy, Legal Authority Enforcement, Practicality, and Customizability. This thesis is all about understanding and utilising the state of the art technologies of Trust Management to come up with a Trust Management Framework that could be Trusted by all its Stakeholders by providing a Continuous Data Control where the exchanged data would be handled in a Trustworthy manner before and after the data release from one party to another. For that we call it: Continuous Trust Management Framework. In this thesis, we present a literature survey where we illustrate the general picture of the current research main categorise as well as the main Trust Stakeholders, Trust Challenges, and Trust Requirements. We picked few samples representing each of the main categorise in the literature of Trust Management Frameworks for detailed comparison to understand the strengths and weaknesses of those categorise. Showing that the current Trust Management Frameworks are focusing on fulfilling most of the Trust Attributes needed by the Trust Stakeholders except for the Continuous Data Control Attribute, we argued for the vitality of our proposed generic design of the Continuous Trust Management Framework. To demonstrate our Design practicality, we present a prototype implementing its basic Stakeholders like the Users, Service Providers, Identity Provider, and Auditor on top of the OpenID Connect protocol. The sample use-case of our prototype is to protect the Users’ email addresses. That is, Users would ask for their emails not to be iii shared with third parties but some Providers would act maliciously and share these emails with third parties who would, in turn, send spam emails to the victim Users. While the prototype Auditor would be able to protect and track data before their release to the Service Providers, it would not be able to enforce the data access policy after release. We later generalise our sample use-case to cover various Mass Active Attacks on Users’ Credentials like, for example, using stolen credit cards or illegally impersonating third-party identity. To protect the Users’ Credentials after release, we introduce a set of theories and building blocks to aid our Continuous Trust Framework’s Auditor that would act as the Trust Enforcement point. These theories rely primarily on analysing the data logs recorded by our prototype prior to releasing the data. To test our theories, we present a Simulation Model of the Auditor to optimise its parameters. During some of our Simulation Stages, we assumed the availability of a Data Governance Unit, DGU, that would provide hardware roots of Trust. This DGU is to be installed in the Service Providers’ server-side to govern how they handle the Users’ data. The final simulation results include a set of different Defensive Strategies’ Flavours that could be utilized by the Auditor depending on the environment where it operates. This thesis concludes with the fact that utilising Hard Trust Measures such as DGU without effective Defensive Strategies may not provide the ultimate Trust solution. That is especially true at the bootstrapping phase where Service Providers would be reluctant to adopt a restrictive technology like our proposed DGU. Nevertheless, even in the absence of the DGU technology now, deploying the developed Defensive Strategies’ Flavours that do not rely on DGU would still provide significant improvements in terms of enforcing Trust even after data release compared to the currently widely deployed Strategy: doing nothing!
APA, Harvard, Vancouver, ISO, and other styles
26

Alhaqbani, Bandar Saleh. "Privacy and trust management for electronic health records." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37635/1/Bandar_Alhaqbani_Thesis.pdf.

Full text
Abstract:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
APA, Harvard, Vancouver, ISO, and other styles
27

Maijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.

Full text
Abstract:
Inter-organisational trust is increasingly important among supply chain participants, where threats are building up from sources out of organisational control. The same problem is faced in the cyber security field, where threat level increases from the changes outside organisational boundaries. Each value chain participating in the supply chain must be secured. Trust building is mandated among all trust network members. The business interaction between supply chain participants is enabled by building inter-organisational trust first. This study provided ways to build this inter-organisational trust by considering steps to take in information security management system (ISMS) implementation. ISMS is set of processes, documentation, activities and resources that together secure assets within an organisation. It must be assembled to support strategic business goals and comply selected requirement criteria. Due to different ways and purposes, organisations implement ISMS’s and obtain the security standard certification; it is not a proof of secure business processes or trust per se. Instead, it is a good starting point for trust building. This study used narrative literature review to find supporting and resisting elements of inter-organisational trust that can consider in ISMS. The study limited the research into a very narrow area between information processing science, behaviour sciences and discipline of management. The research found several elements (102) that can be considered in ISMS to have the effect to interorganisational trust building. The findings were categorised using ISO/IEC 27001 (2013) ISMS implementation steps to provide concrete support for security professionals. There are none or very limited number of research literature on exact combined topic of inter-organisational trust building and ISMS. The multidisciplinary phenomenon of information security coupled with inter-organisational trust requires more attention from the research community. Schools teaching information security should develop their course coverage to support this multidisciplinary phenomenon in several view points, not just from their own discipline to achieve producing suitable resources for the industry
Yritysten välinen luottamus on yhä tärkeämpää toimitusketjuihin osallistuvien organisaatioiden keskuudessa, missä uhat syntyvät yritysten tietoturvakontrollien ulkopuolelta. Sama ongelma kohdataan kyberturvallisuudessa, missä uhkataso kasvaa muutoksista organisaatiorajojen ulkopuolella. Jokaisen toimitusketjuun osallistuvan on suojauduttava. Luottamuksen rakentamisen tehtävä on kaikkien jäsenien yhteinen asia luottamusverkostossa. Toimitusketjuun osallistuvien on rakennettava organisaatioiden välinen luottamus ennen liiketoiminnan aloittamista. Tässä tutkimuksessa tarjotaan keinoja kehittää organisaatioiden välistä luottamusta tietoturvallisuuden hallintajärjestelmän toteuttamisessa. Tietoturvallisuuden hallintajärjestelmä koostuu prosessien, dokumentaation, toimintojen ja resurssien yhdistelmästä, mitkä yhdessä turvaavat tietovarannot organisaation sisällä. Se on koostettava tukemaan liiketoiminnan strategisia tavoitteita ja täyttää valitut kriteeristöt. Koska tietoturvallisuuden hallintajärjestelmiä sertifioidaan eri tavalla, sekä eri tarkoituksia varten, niin sertifioitu standardi ei itsessään takaa turvallisia liiketoimintaprosesseja, vaan se toimii hyvänä lähtöpisteenä luottamuksen rakentamiselle. Tässä tutkimuksessa sovellettiin kirjallisuuskatsausta yritysten välisten luottamusta edistävien ja estävien elementtien löytämiseksi, mitä tietoturvallisuuden hallintajärjestelmän toteutuksessakin voitaisiin soveltaa. Tutkimus toteutettiin rajatulla alueella tietojenkäsittely-, käyttäytymis-, sekä hallintotieteiden yhtymäkohdassa. Tutkimus löysi useita elementtejä (102), mitkä huomioimalla tietoturvallisuuden hallintajärjestelmässä voidaan vaikuttaa yritysten välisen luottamuksen rakentamiseen. Löydökset jaoteltiin ISO/IEC 27001 (2013) tietoturvallisuuden hallintajärjestelmän toteutusaskelien mukaisesti, jotta tulokset tukisivat parhaiten tietoturvallisuuden asiantuntijaa konkreettisella tasolla. Tutkimuspapereita ei ole yhtään, tai niitä on hyvin rajoitetusti missä tietoturvallisuuden hallintajärjestelmän ja yritysten välisen luottamuksen rakentaminen yhdistetään. Monitieteinen tietoturvan ilmiö yhdistettynä yritysten välisen luottamuksen rakentamiseen vaatii enemmän huomiota tiedeyhteisöltä. Tietoturvallisuutta kouluttavien oppilaitosten tulisi kehittää tietoturvallisuuden kurssitarjontaansa tukemaan monitieteellistä lähestymistapaa ei vain oman tutkimusalan näkökulmaa, jotta teollisuus saisi sopivampia resursseja käyttöönsä
APA, Harvard, Vancouver, ISO, and other styles
28

Cousins, Thomas Daniel. "A climate of trust : exploring adaptation policy." Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/4840.

Full text
Abstract:
Bibliography: leaves 24-27.
This paper aims to tease out and unpack the different value positions that inhere in the range of discourses and methods that currently permeate the field of climate change. In doing so, I will examine the underlying concepts, methods and their application by various actors and institutions.
APA, Harvard, Vancouver, ISO, and other styles
29

Tomlinson, Edward C. "Cheap talk, valuable results? A causal attribution model of the impact of promises and apologies on short-term trust recovery." Columbus, Ohio : Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1085062874.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.
Title from first page of PDF file. Document formatted into pages; contains xi, 184 p.; also includes graphics. Includes abstract and vita. Advisor: Roy J Lewicki, Labor and Human Resources Graduate Program. Includes bibliographical references (p. 144-157).
APA, Harvard, Vancouver, ISO, and other styles
30

Albrecht, Simon L. "The dimensions and consequences of trust in senior management." Thesis, Curtin University, 2001. http://hdl.handle.net/20.500.11937/917.

Full text
Abstract:
Trust between individuals and groups has been identified as an important factor in determining organisational success, organisational stability and the well-being of employees. The present research contributes to the growing literature on trust by developing measures and models of how employees trust senior management. Drawing from the literature and the results of pilot studies, a six dimensional model of trust in senior management - consisting of dispositional, cognitive, affective, social and behavioural intent dimensions - was tested using confirmatory factor analysis (n = 416). The results clearly supported the convergent and discriminant validity of the measurement model. For example, all model fit indices were above minimum recommended values and all items loaded at significant levels on their specified factor.The measures were successfully cross- validated in a sample from a different organization (n = 249). Next, models portraying alternative structural relations between the dimensions were examined, before deriving a model which successfully summarized the data in a theoretically plausible way. The model showed trust in senior management, defined in terms of behavioural intentions, to be directly influenced by affective reactions and perceived social norms. Cognitive assessments about the overall effectiveness of senior management were shown to have an indirect influence on trust. This structural model was successfully cross- validated on an independent sample. The attitudinal dimensions of the model were shown to hold, longitudinally, over a twelve month period (n = 257).In contrast to previous cross-sectional research, disposition did not influence trust in senior management over time. In terms of determining the organizational consequences of trust in senior management, the results showed that trust in senior management influenced cynicism toward change over a twelve month time period. Theoretical implications and the practical implications for the diagnosis and management of trust in senior management are discussed.
APA, Harvard, Vancouver, ISO, and other styles
31

Isaeva, Nevena. "Trust and distrust in intra-organisational relationhips." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8616/.

Full text
Abstract:
This thesis contributes to the extant body of knowledge of trust and distrust offering insights into influencing factors in intra-organisational relationships. Drawing on interviews with 50 participants from top UK and USA consulting companies, Mayer, Davis, and Schoorman' s ( 1995) trustworthiness dimensions and trustor associated factors are extended; additional adjuvant trust factors that facilitate and reinforce trust development are identified. These findings also advance understanding of trust by distinguishing between person- and task focused natures of trust. Factors influencing distrust are found to be associated with the distrustor, distrustee's distrustworthiness and adjuvant distrust factors which moderate the distrust development. Questions surrounding the relationship between trust and distrust are raised and considered, revealing trust and distrust as separate but highly associated constructs. Highlighting culture as one of the factors influencing trust and distrust, the thesis also explores these relationships. Following a systematic review, insights gained from empirical research are offered. Building on Chao and Moon's (2005) cultural mosaic, a dynamic conceptualisation and operationalisation of culture is discussed, emphasising particularly the importance of additional associative cultural tiles within the global and diverse organisational contexts. The implications of the findings for future research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
32

Posey, Jamison H. "Technology and trust : technology as impression management in trust development within outsourced information systems development projects /." Full text available from ProQuest UM Digital Dissertations, 2007. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=0&did=1609005771&SrchMode=1&sid=2&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1245341846&clientId=22256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gouret, Camille. "L'administration fiduciaire : Contribution à l'étude de la fiducie." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTD052.

Full text
Abstract:
Arrivée à ces noces d’étain, la fiducie continue de déranger autant qu’elle déroute. Alors que tout oppose la prétendue propriété fiduciaire de la propriété, la doctrine, presque à l’unisson, défend ce mariage contre-nature. Pour administrer le patrimoine créé pour l’occasion, le fiduciaire se verrait confier la toute puissance d’un propriétaire, qu’il faudrait immédiatement s’empresser de contenir pour que fiduciant et bénéficiaire ne se retrouvent pas démunis face au fiduciaire roi dans son royaume. Pourquoi persister en ce sens ? N’est-il pas possible de puiser dans nos catégories juridiques au lieu de les épuiser ? Assurément, la réponse est positive. En replaçant l’affectation voulue par les parties au contrat au cœur de l’opération et en acceptant de sortir des sentiers battus, il est possible de rendre au fiduciaire sa véritable place, celle d’un administrateur de patrimoine doté de pouvoirs propres. L’analyse alternative proposée permettra à la fois d’éclairer le régime applicable, de lever certaines zones d’ombre et d’accroître l’efficacité de l’opération, en offrant au fiduciant et au bénéficiaire les moyens de faire face à un fiduciaire peu scrupuleux
Introduced in the french law since ten years yet, the french trust, as know as « fiducie », keeps destabilising. While everything seems oppose that so-called fiduciary property and the real property, the doctrine preaches for assimilation. To manage the fiduciary estate, the trustee is said to own the whole power as a proprietor, but wich has to be straight away limited to spare the settler and the sestui que trust findind themeselves helpless in front of a powerfully trustee. Why then to prevail in this way ? Isn’t it possible to deal with others mechanism of the legal arsenal instead of altering it ? Doubtlessly, a positive answer has to be given. To focus attention on the allocation (affectation) and to depart from the beaten tracks, allow to take back the trustee his rightful palce : he is an estate manager provided with inherent powers. The analyse suggested succeed in explaining the legal regime, clarifying doubts and increasing effectiveness thanks to means for settler and sestui que trust to deal with a careless trustee
APA, Harvard, Vancouver, ISO, and other styles
34

Wennblom, Gabriella. "Mapping management accounting and trust : an extended literature review." Doctoral thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-26507.

Full text
Abstract:
More than three decades ago the notion of trust was introduced into the management accounting (MA) literature, and a growing stream of empirical papers elaborating on the relation between MA controls and trust signals the importance andvitality of this research area. However, a closer look at the literature shows that while major insights have been made, there is also considerable confusion around both research models and the meanings of key concepts. Accordingly, the time seems opportune to conduct an extended and critical review of the legacies of this literature. More precisely, the aims of the study are to (i) analyze how MA and trust have been conceptualized and related to each other; (ii) identify weaknesses andknowledge gaps in the literature; and, (iii) based on these, suggest how the literature may be synthesized and developed in the future. In so doing, this thesis analyses 37 empirical studies focusing specifically on the association between MA and trust. Overall, two key findings emerge from the analysis. A first key finding is that the area can be characterized as fragmented. More specifically, many different terms are used to denote similar concepts, and vice versa. The literature is also characterized by different levels of analysis, and different, potentially conflicting research models. The literature is also underpinned by different theoretical perspectives, of which some have conflicting assumptions. The second key finding is that there are several knowledge gaps and weaknesses in th eliterature. For example, while a majority of studies shows that MA is a factor affecting trust, MA itself is oftentimes left unexplained. Also, many studies conceptualize trust from the perspective of only one party in a relationship, and the questions of how and why MA and trust (co)develops and emerges over time are largely unaddressed. Furthermore, while researchers have empirically studied both personal trust and system trust, respectively, no one has modelled how they may be interrelated. Based on these findings, a model is proposed which not only synthesizes the extant literature, but also indentifies new, potentially important associations between different MA and trust factors. The model—consisting of twelve propositions—also theorizes how these factors affect each other over time. The thesis concludes with a number of suggestions for how to develop this research area in the future.
APA, Harvard, Vancouver, ISO, and other styles
35

Kenning, Peter. "Customer Trust Management : ein Beitrag zum Vertrauensmanagement im Lebensmitteleinzelhandel /." Wiesbaden : Dt. Univ.-Verl, 2002. http://www.gbv.de/dms/zbw/356107175.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Atkinson, Roger. "Information system's project management and the phenomenon of trust." Thesis, Bournemouth University, 2004. http://eprints.bournemouth.ac.uk/364/.

Full text
Abstract:
The aim of this research was to investigate how the continual low success rate of IS projects could be improved through an evaluation of success and failure factors. A literature review revealed a comprehensive but uncoordinated history of research into the identification of the critical factors. This proved to be inconclusive, but did indicate that project management contributed more to the failures than the technology. A model for expressing the complexity of IS project environments is proposed to aid project teams with their strategy. Also, the criteria for measuring success of both project managemenat nd IS projects has been extended. Although many disciplines had considered trust as a success factor, this was missing within the domain of project management. To examine the effect of trust in an IS project environment a game termed Project Paradox was designed and run. A lack of trust was found to be compounded by conflicting objectives inherent within IS projects. It is recommended that the issues relating to trust should be considered and managed as an integral part of a risk analysis. To enable this to be realised in practice a framework for a Trust Audit is proposed. The thesis concludes with a number of research initiatives aimed at improving the success rate of IS projects.
APA, Harvard, Vancouver, ISO, and other styles
37

Reighard, Daniel K. II. "Incorporating trust into Department of Defense acquisition risk management." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43986.

Full text
Abstract:
Approved for public release; distribution is unlimited
Risk management has been proven to be a valuable tool to identify and mitigate risks early in the program life-cycle. Modernization and communication advances have recently changed the commercial economy from national to global. Companies are starting to venture into new partnerships with foreign companies. However, there has also been an increase in business corruption, like Fannie Mac and Enron, which has raised skepticism in entering new partnerships. Industry is addressing this fact by no longer exclusively depending on science as the determining factor in risk assessment and starting to include trust as a factor in risk management. Qualitative measurements are being analyzed in attempted to address these uncertainties by incorporating trust into the risk management process. The purpose of this paper was to determine whether it was feasible and advantageous to incorporate trust into the risk management process for Department of Defense (DOD) acquisition. The premise of this research was that there were hidden risk factors attributed to qualitative measures that were not being identified in current DOD risk management processes. A preliminary conclusion of this thesis is that trust is a valuable factor in the risk assessment process that can help identify qualitative risk elements.
APA, Harvard, Vancouver, ISO, and other styles
38

Bao, Fenye. "Dynamic Trust Management for Mobile Networks and Its Applications." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23157.

Full text
Abstract:
Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we design and validate a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management with trust-based applications. Unlike existing work, we consider social trust derived from social networks in addition to traditional quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of nodes in mobile network applications. Untreated in the literature, we design and validate trust composition, aggregation, propagation, and formation protocols for dynamic trust management that can learn from past experiences and adapt to changing environment conditions to maximize application performance and enhance operation agility. Furthermore, we propose, explore and validate the design concept of application-level trust optimization in response to changing conditions to maximize application performance or best satisfy application requirements. We provide formal proof for the convergence, accuracy, and resiliency properties of our trust management protocols. To achieve the goals of identifying the best trust protocol setting and optimizing the use of trust for trust-based applications, we develop a novel model-based analysis methodology with simulation validation for analyzing and validating our dynamic trust management protocol design.
The dissertation research provides new understanding of dynamic trust management for mobile wireless networks. We gain insight on the best trust composition and trust formation out of social and QoS trust components, as well as the best trust aggregation and propagation protocols for optimizing application performance. We gain insight on how a modeling and analysis tool can be built, allowing trust composition, aggregation, propagation, and formation designs to be incorporated, tested and validated. We demonstrate the utility of dynamic trust management protocol for mobile networks including mobile ad-hoc networks, delay tolerant networks, wireless sensor networks, and Internet of things systems with practical applications including misbehaving node detection, trust-based survivability management, trust-based secure routing, and trust-based service composition. Through model-based analysis with simulation validation, we show that our dynamic trust management based protocols outperform non-trust-based and Bayesian trust-based protocols in the presence of malicious, erroneous, partly trusted, uncertain and incomplete information, and are resilient to trust related attacks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
39

Coleman, Kimberly Jane. "The Role of Trust in Collaborative Natural Resource Management." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/64987.

Full text
Abstract:
This dissertation examines how trust develops in landscape level collaborative natural resource management efforts. I took a case study approach to research four projects in the Collaborative Forest Landscape Restoration Program (CFLRP). I conducted qualitative analysis of interviews, notes and observations from site visits and archival documents to understand the role and function of trust within my four case studies. The results are organized into five chapters: an introduction chapter, three manuscripts intended for stand-alone publication (Chapters 2-4), and a conclusion chapter. Chapter 2 reports on the development and function of trust within the four collaboratives I studied. Chapter 3 discusses the roles of facilitators and coordinators for engendering and maintaining trust. Chapter 4 examines three of the four case studies and compares the observed trust outcomes to the literature on traditional forms of public involvement. Finally, Chapter 5 synthesizes the findings from Chapters 2-4. These results provide useful information about the types of trust that contribute to successful collaborative efforts, as well as identify some of the practices and structures that engender those types of trust.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
40

Zikhali, Precious. "Land reform, trust and natural resource management in Africa /." Göteborg : [Department of Economics, School of Economics and Commercial Law] : University of Gothenburg, 2008. http://hdl.handle.net/2077/18382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Albrecht, Simon L. "The dimensions and consequences of trust in senior management." Curtin University of Technology, School of Psychology, 2001. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=13109.

Full text
Abstract:
Trust between individuals and groups has been identified as an important factor in determining organisational success, organisational stability and the well-being of employees. The present research contributes to the growing literature on trust by developing measures and models of how employees trust senior management. Drawing from the literature and the results of pilot studies, a six dimensional model of trust in senior management - consisting of dispositional, cognitive, affective, social and behavioural intent dimensions - was tested using confirmatory factor analysis (n = 416). The results clearly supported the convergent and discriminant validity of the measurement model. For example, all model fit indices were above minimum recommended values and all items loaded at significant levels on their specified factor.The measures were successfully cross- validated in a sample from a different organization (n = 249). Next, models portraying alternative structural relations between the dimensions were examined, before deriving a model which successfully summarized the data in a theoretically plausible way. The model showed trust in senior management, defined in terms of behavioural intentions, to be directly influenced by affective reactions and perceived social norms. Cognitive assessments about the overall effectiveness of senior management were shown to have an indirect influence on trust. This structural model was successfully cross- validated on an independent sample. The attitudinal dimensions of the model were shown to hold, longitudinally, over a twelve month period (n = 257).In contrast to previous cross-sectional research, disposition did not influence trust in senior management over time. In terms of determining the organizational consequences of trust in senior management, the results showed that trust in senior management influenced cynicism toward change ++
over a twelve month time period. Theoretical implications and the practical implications for the diagnosis and management of trust in senior management are discussed.
APA, Harvard, Vancouver, ISO, and other styles
42

DeShaw, Michèle. "Trust, collegiality, and community /." dissertation online, 2009. http://pqdtopen.proquest.com/#abstract?dispub=3379005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Martucci, Leonardo, Sebastian Ries, and Max Mühlhäuser. "Sybil-FreePseudonyms, Privacy and Trust : Identity Management in the Internet of Services." Technische Universität Darmstadt, Telecooperation Lab (TK), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-27767.

Full text
Abstract:
We propose an identity management system that supports role-based pseudonymsthat are bound to a given set of services (service contexts) and supportthe use of reputation systems. Our proposal offers a solution for the problemof providing privacy protection and reputation mechanisms concurrently.The trust information used to evaluate the reputation of users is dynamic andassociated to their pseudonyms. In particular, our solution does not requirethe support or assistance from central authorities during the operation phase.Moreover, the presented scheme provides inherent detection and mitigation ofSybil attacks. Finally, we present an attacker model and evaluate the securityand privacy properties and robustness of our solution.
APA, Harvard, Vancouver, ISO, and other styles
44

Lau, Hat-lan, and 劉克蘭. "Trust relations in the construction industry." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Dionysiou, Ioanna. "Dynamic and composable trust for indirect interactions." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/i%5Fdionysiou%5F072406.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Johnson, Devon Samuel. "Cognitive and affective trust in service relationships." Thesis, London Business School (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Daudi, Morice [Verfasser]. "Trust in Sharing Resources in Logistics Collaboration / Morice Daudi." Düren : Shaker, 2019. http://d-nb.info/1188552376/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Shabut, Antesar R. M. "Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/7501.

Full text
Abstract:
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significant issue in securing these environments to allow entities decide on the reliability and trustworthiness of other entities, besides it helps coping with defection problems and stimulating entities to cooperate. Recent models on evaluating trustworthiness in distributed systems have heavily focused on assessing trustworthiness of entities and isolate misbehaviours based on single trust metrics. Less effort has been put on the investigation of the subjective nature and differences in the way trustworthiness is perceived to produce a composite multidimensional trust metrics to overcome the limitation of considering single trust metric. In the light of this context, this thesis concerns the evaluation of entities’ trustworthiness by the design and investigation of trust metrics that are computed using multiple properties of trust and considering environment. Based on the concept of probabilistic theory of trust management technique, this thesis models trust systems and designs cooperation techniques to evaluate trustworthiness in mobile ad hoc networks (MANETs). A recommendation based trust model with multi-parameters filtering algorithm, and multidimensional metric based on social and QoS trust model are proposed to secure MANETs. Effectiveness of each of these models in evaluating trustworthiness and discovering misbehaving nodes prior to interactions, as well as their influence on the network performance has been investigated. The results of investigating both the trustworthiness evaluation and the network performance are promising.
Ministry of Higher Education in Libya and the Libyan Cultural Attaché bureau in London
APA, Harvard, Vancouver, ISO, and other styles
49

Steyn, Esther. "Are unit trust performances inflated at quarter-ends." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53290.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: Suspicion has long existed that the performance of unit trusts is artificially inflated at quarter-ends, as those are the periods focussed on in the press. Studies investigating this have been done in the USA, but to date no similar study has been done in South Africa. This study examines the daily net asset value (NAV) performances of South Africa's domestic equity funds for the period from 1996 to 2002, as obtained from the MoneyMate database. Specifically, returns in excess of the benchmark index at quarterends are compared to excess returns at other month ends. The benchmark index performance is subtracted to correct for movement in the market. Domestic equity funds are divided into nine sectors and in much of this study, the funds in a sector are examined collectively. Results show that unit trust performance does peak at year-ends and quarter-ends, with a subsequent drop at the start of years and quarters. Furthermore, more funds beat the JSE All Share Index at year-ends and quarter-ends, than is normally the case. In contrast, this pattern was not repeated in the percentage of funds beating zero. Following these results, tests were done to establish whether a relationship exists between an end-of-quarter positive return and a subsequent beginning-of-quarter negative return. The suspected relationship was confirmed specifically in the funds from the period from 2000 to 2002. From this study, it would appear that inflating unit trust performances at quarter-ends is not yet extinct in South Africa. Advice to potential investors would therefore be to invest at the beginning of a quarter and to sell at the end.
AFRIKAANSE OPSOMMING: Daar bestaan lank reeds die vermoede dat die opbrengste van effektetrusts op kwartaaleindes opwaarts bestuur word, siende dat dit die opbrengste is wat dekking in die media geniet. Daar is al in die VSA studies gedoen wat hierdie vermoede ondersoek, maar tot op hede was daar nog geen soortgelyke studie in Suid-Afrika nie. Hierdie studie ondersoek die daaglikse opbrengste van die netto batewaarde van Suid- Afrika se binnelandse effektetrusts vir die tydperk 1996 tot 2002, soos verkry van die databasis MoneyMate. Die verskil tussen opbrengste van die effektetrusts en die indeks op kwartaaleindes is vergelyk met die verskil op ander maandeindes (die verskil tussen opbrengste is geneem om bewegings in die mark in ag te neem). Plaaslike effektetrusts word in nege sektore verdeel, en in die grootste deel van hierdie studie word die effektetrusts in 'n sektor as 'n geheel ondersoek. Resultate toon dat effektetrusts opbrengste wel pieke toon op jaareindes en kwartaaleindes, en dan weer val in die begin van jare en kwartale. Verder is daar ook meer effektetrusts wat beter vaar as die JSE Alle Aandele Indeks op jaareindes en kwartaaleindes as wat normaalweg die geval is. In kontras word hierdie patroon nie herhaal as gekyk word na die persentasie van effektetrusts wat nul klop nie. Na aanleiding van hierdie resultate is toetse gedoen om vas te stel of daar 'n verband bestaan tussen positiewe opbrengste op kwartaaleindes en die daaropvolgende negatiewe opbrengste aan die begin van kwartale. Hierdie verband is veral gevind vir die tydperk 2000 tot 2002. Uit hierdie studie wil dit blyk dat, in Suid-Afrika, die opbrengste van effektetrusts op kwartaaleindes wel kunsmatig verhoog word. Raad aan voornemende beleggers sou dus wees om aan die begin van 'n kwartaal te koop, en aan die einde te verkoop.
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Zhi. "Autoregression Models for Trust Management in Wireless Ad Hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20288.

Full text
Abstract:
In this thesis, we propose a novel trust management scheme for improving routing reliability in wireless ad hoc networks. It is grounded on two classic autoregression models, namely Autoregressive (AR) model and Autoregressive with exogenous inputs (ARX) model. According to this scheme, a node periodically measures the packet forwarding ratio of its every neighbor as the trust observation about that neighbor. These measurements constitute a time series of data. The node has such a time series for each neighbor. By applying an autoregression model to these time series, it predicts the neighbors future packet forwarding ratios as their trust estimates, which in turn facilitate it to make intelligent routing decisions. With an AR model being applied, the node only uses its own observations for prediction; with an ARX model, it will also take into account recommendations from other neighbors. We evaluate the performance of the scheme when an AR, ARX or Bayesian model is used. Simulation results indicate that the ARX model is the best choice in terms of accuracy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography