To see the other types of publications on this topic, follow the link: Trustworthine.

Dissertations / Theses on the topic 'Trustworthine'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Trustworthine.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

BIELLA, MARCO. "Dynamics of Face-Context Integration: How Threat Cues Influence the Processing of Facial Trustworthiness." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2019. http://hdl.handle.net/10281/241067.

Full text
Abstract:
La prima impressione è spesso basata su informazioni limitate che sono estratte automaticamente dall’aspetto dei target. Una classe di giudizi particolarmente importante è quella relativa al giudizio di trustworthiness. Data la sua importanza, siamo in grado di formarci un’impressione di trustworthiness già dopo 33ms di esposizione al volto della persona target. Inoltre il giudizio riguardante la trustworthiness si forma più velocemente dei giudizi riguardanti altre dimensioni della percezione sociale (eg. Dominanza, competenza e piacevolezza). In letteratura altri studi mostrano evidenze riguardanti un vantaggio nel ricordo di volti untrustworthy che supera il vantaggio attribuito a volti che variano lungo altre dimensioni di percezione sociale. In aggiunta è stato dimostrato che la trustworthiness di un volto può predire risposte di approccio o evitamento nell’osservatore. Nella maggior parte degli studi che indagano la percezione di trustworthiness i volti vengono presentati per un breve momento sullo schermo del computer e ai partecipanti è chiesto di categorizzarli. Di conseguenza la percezione di trustworthiness estratta dal volto è spesso considerata come una caratteristica che viene elaborata in maniera relativamente indipendente dal contesto. Tuttavia i volti non vengono mai incontrati in assenza di un contesto nella vita di tutti i giorni. Il presente lavoro cerca di estendere la letteratura precedente indagando come informazioni contestuali possano impattare la percezione di trustworthiness estratta dai volti. A tal scopo abbiamo condotto 8 esperimenti e 5 pretest (N = 691) basati sia su misure che rilevano l’outcome della percezione (eg. Giudizi espliciti e categorizzazioni) che su misure sensibili al processo sottostante (eg. Mouse-tracking). I risultati dei singoli esperimenti e una meta-analisi condotta sull’intero set di dati mostrano che le informazioni contestuali collegate alla minacciosità influenzano il giudizio di trustworthiness. Il presente lavoro dimostra la specificità delle informazioni di minaccia e mette in evidenza come l’effetto della minaccia vada ben oltre l’effetto della semplice valenza. Sembra quindi che la presenza nel contesto di informazioni di minaccia promuova la categorizzazione di un volto come untrustworthy. Al contrario le stesse informazioni contestuali di minaccia sembrano interferire con il processo di percezione rendendo la categorizzazione di volti trustowrthy meno fluida. Un altro aspetto che i nostri dati suggeriscono è che l’integrazione tra la trustworthiness e le informazioni di minaccia avvenga ad un profondo livello dell’architettura cognitiva. Tale risultato è in linea con una prospettiva evolutiva ed è ottenuto dimostrando che l’integrazione di informazioni avviene solo quando tali informazioni sono presenti nello stesso sistema percettivo e non quando le informazioni da integrare provengono da sistemi percettivi differenti. Il quadro generale dei nostri risultati rivela la flessibilità della percezione di trustworthiness e come questa possa essere influenzata da informazioni contestuali allo stimolo percepito.
Our impressions of others are often based on limited information that is spontaneously and automatically extracted from their faces. An important class of inferences concerns judgments of trustworthiness. As such, people start discriminating trustworthiness after 33ms of exposure to a face and the detection of trustworthiness in faces is faster than the detection of a variety of other characteristics, including dominance, likeability, and competence. People show a memory advantage for faces varying on trustworthiness compared with those varying on likeability, friendliness, and dominance and facial trustworthiness predicts basic approach/avoidance responses. In the vast majority of studies examining facial trustworthiness, faces are flashed on the computer screen, and categorization of trustworthiness quickly ensues. In other words, evaluation of facial trustworthiness is often thought to be based on facial features and relatively immune to context cues. However, we rarely encounter an isolated facial expression in the real world. The present dissertation aimed at complementing and extending prior research evidence by investigating whether contextual information may impact the perception of facial trustworthiness. We conducted 8 main experiments and 5 pretests (N = 691) combining outcome based measures (i.e., ratings and explicit evaluations) with process-sensitive measures (i.e., mouse tracking). Results of each single experiment and the meta-analysis of the whole experimental data show that contextual threat information influences the evaluation of facial trustworthiness. We showed the specificity of threat information proving that the effects we found goes over and beyond negative information more in general. Thus, contextual threat information promoted the evaluation and categorization of facial untrustworthiness. By contrast, threatening contextual cues disrupted the processing of trustworthy faces. Moreover, our data suggested that such an integration occurs at a low cognitive level, in accordance with an evolutionary perspective, by showing that the integration is possible when information to be integrated lay in the same perceptual system but not when information is stored on different perceptual systems. Taken together, our findings reveal the malleable nature of trustworthiness such that its perception is readily pushed around by scene context.
APA, Harvard, Vancouver, ISO, and other styles
2

BACCOLO, ELISA. "It’s written all over your face. The ontogeny of sensitivity to facial cues to trustworthiness." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/277385.

Full text
Abstract:
Gli esseri umani sono ipersensibili a quelle proprietà facciali che trasmettono segnali sociali. La capacità di attribuire giudizi di affidabilità basati sui segnali del volto, vale a dire quei segnali che usiamo per dedurre se una persona può essere avvicinata in modo sicuro o piuttosto evitata, è nota per essere veloce, automatica e basata su pochissime informazioni. Questa tesi di dottorato mira a indagare: (1) se la sensibilità ai tratti di affidabilità del volto sia modulata da differenze individuali nelle attitudini sociali e comportamentali; (2) la traiettoria evolutiva di questa sensibilità; (3) se la sensibilità alle sottili variazioni degli indizi facciali all'affidabilità è un fenomeno universale o è piuttosto modulata dalla cultura e / o dall'etnia del viso. Il Capitolo 1 mira a indagare se differenze nella sensibilità percettiva e nella rappresentazione mentale di volti che variano per livello di affidabilità espressa sono associate a differenze individuali relative alla motivazione sociale. I risultati hanno mostrato che le differenze individuali nella motivazione sociale possono avere un impatto sulla quantità di esperienza sociale e quindi sul livello di sensibilità nei confronti di segnali facciali all'affidabilità. Il capitolo 2 si è concentrato sulla traiettoria evolutiva di tale sensibilità. Lo studio 2 mira a studiare in che modo la sensibilità percettiva e la rappresentazione mentale di differenze minime nell'informazione facciale che sottende la percezione di affidabilità si sviluppano nel tempo, tenendo conto delle differenze individuali nello sviluppo emotivo. I risultati hanno mostrato che la sensibilità ai segnali di affidabilità del volto e la capacità di impiegare questi segnali per generare giudizi di affidabilità è presente in età prescolare, ma matura per raggiungere livelli simili a quelli degli adulti all'età di 7 anni, sviluppandosi insieme alle capacità di comprensione delle emozioni. Gli studi 3 e 4 hanno utilizzato due diversi paradigmi EEG con neonati di 6 mesi per indagare se questa sensibilità sia già presente nel primo anno di vita. I dati combinati provenienti dagli studi 3 e 4 contribuiscono a dimostrare che i bambini di 6 mesi sono sensibili a quegli indizi facciali che vengono successivamente utilizzati per generare giudizi di affidabilità. Infine, il capitolo 3 presenta una convalida di stimoli che verranno utilizzati per esplorare la presenza di differenze cross-culturali nello sviluppo nella percezione dell'affidabilità del volto. Nel complesso, tutti gli studi presentati suggeriscono che la sensibilità ai tratti di affidabilità del volto si manifesta nei primissimi anni di vita, per poi affinarsi tramite l'esperienza nel corso dello sviluppo. Inoltre, suggeriscono che la percezione dell’affidabilità di un volto potrebbe essere cross-culturale, in quanto non è influenzata dall'esperienza che un individuo acquisisce con una determinata categoria di volti.
Human beings are hypersensitive to those facial properties that convey social signals. The ability to attribute trustworthiness judgements based on facial cues to trustworthiness, i.e. those cues that we use to derive whether a person can be safely approached or better avoided, is known to be fast, automatic and based on very little information. This doctoral dissertation aims at investigating: (1) whether sensitivity to facial cues to trustworthiness is modulated by individual variations in social personality characteristics; (2) the developmental trajectory of this sensitivity; (3) if sensitivity to subtle variations in facial cues to trustworthiness is a universal phenomenon or is it modulated by culture and/or face ethnicity. Chapter 1 aimed at investigating whether individual differences in fine-grained perceptual sensitivity and mental representation of facial features related to trustworthiness judgements are associated with individual differences in social motivation. Results showed that individual differences in social motivation can have an impact on the amount of social experience and thus the level of developed sensitivity to facial cues to trustworthiness. Chapter 2 focused on the developmental trajectory of such sensitivity. Study 2 aimed to investigate how perceptual sensitivity to and mental representation of fine-grained differences in facial information subtending social perception of trustworthiness develops in time, taking into account individual differences in emotional development. Results showed that sensitivity to facial cues to trustworthiness and the ability to employ these cues to generate trustworthiness judgements is present in preschool years, but matures to reach adult-like levels at the age of 7, developing together with emotion understanding abilities. Study 3 and 4 used two different EEG paradigms with 6-month-old infants to question whether this sensitivity is already present in the first year of life. Combined data coming from Study 3 and 4 contribute in showing that 6-month-old infants are sensitive to those facial cues that are later used to generate trustworthiness judgements. Finally, Chapter 3 presents a validation of stimuli that will be used to explore the presence of developmental cross-cultural differences in the perception of face trustworthiness. Overall, all presented studies suggest that sensitivity to facial cues to trustworthiness manifests in the very first years of life, to be then refined by experience over the course of development. Moreover, they suggest that trustworthiness perception could be cross-cultural, as it is not influenced by the experience an individual gains with a certain face category.
APA, Harvard, Vancouver, ISO, and other styles
3

SILVESTRI, VALENTINA. "AND I’LL SEE YOU IN THE HIGH AND LOW. The ontogenetic origins of sensitivity to facial cues to trustworthiness and emotion." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2022. http://hdl.handle.net/10281/379215.

Full text
Abstract:
Una componente fondamentale della competenza sociale degli esseri umani è l'abilità di estrarre rapidamente e in modo spontaneo i segnali sociali che provengono dal volto, quali per esempio i tratti emotivi e di affidabilità. Il fatto che le risposte a queste configurazioni facciali siano rapide e automatiche suggerisce come esse derivino dalla pressione evolutiva a rilevare segnali di pericolo per aumentare le possibilità di sopravvivenza. Tuttavia, le origini ontogenetiche di queste abilità sociali sono ancora oggetto di dibattito. La presente tesi di dottorato si pone l'obiettivo di indagare la natura dell’informazione visiva che media la discriminazione delle emozioni e/o la percezione dell'affidabilità dai volti utilizzando l'approccio del filtraggio spaziale, ossia la rimozione selettiva di bande di frequenze spaziali contenute nell'immagine. Nello specifico, l’elaborato comprende 5 studi volti a indagare (1) la natura dell'informazione visiva sui cui si basano i giudizi espliciti di affidabilità degli adulti (Studio 1) (2) se la percezione di affidabilità di adulti (Studio 2) e bambini (Studio 3) è generalizzata a volti di un'etnia differente dalla propria e la natura dell'informazione visiva coinvolta, (3) la natura dell'informazione visiva che determina la discriminazione neurale di affidabilità dai volti nei preverbali (Studio 4), e (4) la natura dell'informazione visiva su cui si basa la discriminazione visiva delle emozioni alla nascita (Studio 5a e 5b). I risultati dello Studio 1 mostrano che sebbene sia le informazioni visive globali, veicolate dalle frequenze spaziali basse, che le informazioni visive locali, veicolate dalle frequenze spaziali alte, sono sufficienti per discriminare tra livelli di affidabilità, l'informazione globale gioca un ruolo cruciale. Gli Studi 2 e 3 estendono le considerazioni sulla natura dell'informazione visiva coinvolta nella percezione di affidabilità a volti meno presenti nell'ambiente sociale dell'individuo, volti di un'altra etnia. Dunque, l'obiettivo è indagare se la percezione di affidabilità nei bambini (Studio 3) si basa sulle stesse informazioni visive su cui si basa negli adulti (Studio 2) e se la stessa differisca in base all'etnia del volto. I risultati mostrano che le informazioni visive coinvolte nella percezione di affidabilità dai volti della propria o altrui etnia cambiano in relazione al grado di familiarità del volto durante lo sviluppo. Nello Studio 4, attraverso un nuovo paradigma di registrazione della risposta neurale, la Fast Periodic Visual Stimulation, viene esplorata l'informazione visiva che i bambini di 6 mesi utilizzano per discriminare tra volti affidabili e inaffidabili. I bambini di 6 mesi discriminano tra volti affidabili e non affidabili sulla base di informazioni visive differenti. Le informazioni locali mediano la discriminazione di volti affidabili mentre la discriminazione di volti non affidabili si basa su informazione visiva locale. I risultati vengono discussi alla luce delle eventuali implicazioni per la comprensione dei meccanismi percettivi e neurali coinvolti nella discriminazione di volti a valenza positiva e negativa. Lo Studio 5 ha indagato il ruolo dell'informazione visiva nella percezione delle emozioni alla nascita. I neonati a 2 giorni di vita discriminano tra volti felici e impauriti sia quando rimangono solo le frequenze spaziali alte che quando rimangono solo le frequenze spaziali basse. Tuttavia, i neonati preferiscono i volti felici ai volti impauriti solo quando nell’immagine rimangono le frequenze spaziali alte. Dunque, l'informazione visiva presente nell'immagine modula la salienza dei segnali sociali dai volti fin dalle prime ore di vita. Nel complesso, i risultati suggeriscono che la percezione di affidabilità ed emotiva si basa su una sensibilità adattiva ed evoluzionistica che si raffina nel corso dello sviluppo come risultato dell'esperienza nell'ambiente sociale.
One fundamental component of humans' social competence is the ability to rapidly and spontaneously extrapolate facial cues of emotion and trustworthiness - i.e., whether others are likely to approach us friendly or hostilely. The fast and automatic nature of these responses to facial configurations has led to the claim that they derive from evolutionary pressure to detect signals of potential harm, and distinguish between friends or foes to enhance our chances of survival. However, the ontogenetic origins of these fundamental social skills are still debated. To explore this question, the studies reported in this doctoral dissertation investigated the nature of the visual information driving emotion discrimination and/or trustworthiness perception across the life span using the spatial filtering approach - i.e., the selective removal of portions of the spatial frequencies (SF) information contained in the image. Specifically, this doctoral dissertation includes 5 studies aimed at investigating (1) the nature of the visual information on which adults' explicit judgments of trustworthiness are based (Study 1), (2) whether trustworthiness perception in adults (Study 2) and children (Study 3) generalizes across face-race and/or the nature of the visual information on which trustworthiness judgments are based differs for more versus less familiar face categories, (3) the nature of the visual information that triggers neural discrimination of facial cues to trustworthiness in preverbal infants (Study 4), and (4) the nature of the visual information that mediates visual discrimination of emotional facial expressions at birth (Study 5a and 5b). Results of Study 1 showed that, although both global visual cues, conveyed by low-spatial frequency bands, and local visual cues, conveyed by high-spatial frequency bands, are sufficient to discriminate between levels of trustworthiness, the selective removal of global information negatively impacts trustworthiness perception. Study 2 and 3 extended evidence on the nature of visual information involved in trustworthiness perception to faces underrepresented in the individual's social environment, other-race faces, in adults and preschool and school children. Results showed that in the course of development the visual information involved in own- and other-race trustworthiness perception changes. Study 4 used a newly developed Electroencephalographic (EEG) visual discrimination paradigm, the Fast Periodic Visual Stimulation, to investigate which visual information 6-month-old infants use to discriminate between trustworthy and untrustworthy faces. The infants’ brain discriminated between high-trustworthy and low-trustworthy faces based on different types of visual information. Results are discussed for their implications for the understanding of the perceptual/neural mechanisms involved in early discrimination between positive and negative valence faces. Study 5 explored the role of visual information in emotion perception at birth. 2-days-old newborns discriminate between happy and fearful facial expressions with both high and low spatial frequency information but they prefer happy faces when only high spatial frequencies remain. The visual information present in the image modulates the salience of the facial cues to emotions from the first hours of life. Altogether, the evidence gathered from the current studies adds to the existing literature suggesting that emotion and trustworthiness perception are based on an adaptive and evolutionary sensitivity early in life that is refined over the course of development as a result of the quantity and quality of facial experience in the social environment.
APA, Harvard, Vancouver, ISO, and other styles
4

McColl, James. "Trust & trustworthiness." Theological Research Exchange Network (TREN), 1989. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arockiasamy, Britto N. "Trustworthiness of Web Services." UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/531.

Full text
Abstract:
Workflow systems orchestrate various business tasks to attain an objective. Web services can be leveraged to handle individual tasks. Before anyone intends to leverage service components, it is imperative and essential to evaluate the trustworthiness of these services. Therefore, choosing a trustworthy service has become an important decision while designing a workflow system. Trustworthiness can be defined as the likelihood of a service functioning as it is intended. Selection of a service that satisfies business goals involves collecting relevant information such as security mechanisms, reliability, performance and availability. It is important to arrive at total trustworthiness, which incorporates all of the above mentioned multi-facet values relevant to a service. These values can be gathered and analyzed to derive the total trustworthiness of a service. Measuring trustworthiness of a service involves arriving at a suitable value that would help an end-user make a decision for the given business settings. The primary focus of this thesis is to gather relevant details and measure trustworthiness based on inputs provided by the user. A conceptual model was developed after extensive literature review to identify factors that influence trustworthiness of a service. A mechanism was created to gather concept values for a given service and utilize those values to calculate trustworthiness index value. A proof-of-concept prototype was also developed. The prototype is a web-based application that implements the mechanism to measure the trustworthiness of the service. The prototype was evaluated using a scenario-based analysis method to demonstrate the utility of the trustworthiness mechanism using three different scenarios. Results of the evaluation shows that trustworthiness is a multidimensional concept, the relevant conceptual values can be collected, a trustworthiness index value can be calculated based on the gathered concepts, and a trustworthiness index can be interpreted to select the most relevant service for a given requirement.
APA, Harvard, Vancouver, ISO, and other styles
6

Haines, Thomas E. "Towards trustworthiness without trusted authorities." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/112814/1/Thomas_Haines_Thesis.pdf.

Full text
Abstract:
This project focuses on improving public consensus systems by reducing reliance on the powerful authorities which are prevalent in modern electronic voting schemes. We investigate how new cryptographic protocols with human involvement can remove or reduce reliance on trusted authorities. We improve the in-polling-booth electronic voting scheme "Prêt à Voter" to allow higher privacy. We propose an online voting scheme called "VOTOR" that prevents the authorities from learning or casting votes, along with other desirable properties. Finally, we design a forward-secure and unconditionally anonymous linkable ring signature, with applications to onlinevoting.
APA, Harvard, Vancouver, ISO, and other styles
7

Doan, Trung Son [Verfasser]. "On Trustworthiness Recommendation / Trung Son Doan." Hagen : FernUniversität in Hagen, 2017. http://d-nb.info/1137181621/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Rubin. "Improving application trustworthiness on stock Android." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pattanaphanchai, Jarutas. "Trustworthiness of Web information evaluation framework." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/370596/.

Full text
Abstract:
Assessing the quality of information on the Web is a challenging issue for at least two reasons. Firstly, there is little control over publishing quality. Secondly, when assessing the trustworthiness of Web pages, users tend to base their judgements upon subjective criteria such as the visual presentation of the website, rather than rigorous criteria such as the author's qualifications or the source's review process. As a result, Web users tend to make incorrect assessments of the trustworthiness of the Web information they are consuming. Also, they are uncertain of their ability to make a decision whether to trust information they are not familiar with. This research addresses this problem by collecting and presenting metadata based on useful practice trustworthiness criteria, in order to support the users' evaluation process for assessing the trustworthiness of Web information during their information seeking processes. In this thesis, we propose the Trustworthiness of Web Information Evaluation (TWINE) application framework, and present a prototype tool that employs this framework for a case study of academic publications. The framework gathers and provides useful information that can support users' judgments of the trustworthiness of Web information. The framework consists of two layers: the presentation layer and the logic layer. The presentation layer is composed of input and output modules, which are the modules that interface with the users. The logic layer consists of the trustworthiness criteria and metadata creation modules. The trustworthiness criteria module is composed of four basic criteria, namely: authority, accuracy, recency and relevance. Each criterion consists of the items, called indicators, in order to indicate the trustworthiness of Web information based on their criteria. The metadata creation module gathers and integrates metadata based on the proposed criteria that will then be used in the output module in order to generate the supportive information for users. The framework was evaluated based on the tool, using an empirical study. The study set a scenario that new postgraduate students search for publications to use in their report using the developed tool. The students were then asked to complete a questionnaire, which was then analysed using quantitative and qualitative methods. The results from the questionnaire show that the confidence level of users when evaluating the trustworthiness of Web information does increase if they obtain useful supportive information about that Web information. The mean of the confidence level of their judgments increases by 12.51 percentage points. Additionally, the number of selected ssessing the quality of information on the Web is a challenging issue for at least two reasons. Firstly, there is little control over publishing quality. Secondly, when assessing the trustworthiness of Web pages, users tend to base their judgements upon subjective criteria such as the visual presentation of the website, rather than rigorous criteria such as the author's qualifications or the source's review process. As a result, Web users tend to make incorrect assessments of the trustworthiness of the Web information they are consuming. Also, they are uncertain of their ability to make a decision whether to trust information they are not familiar with. This research addresses this problem by collecting and presenting metadata based on useful practice trustworthiness criteria, in order to support the users' evaluation process for assessing the trustworthiness of Web information during their information seeking processes. In this thesis, we propose the Trustworthiness of Web Information Evaluation (TWINE) application framework, and present a prototype tool that employs this framework for a case study of academic publications. The framework gathers and provides useful information that can support users' judgments of the trustworthiness of Web information. The framework consists of two layers: the presentation layer and the logic layer. The presentation layer is composed of input and output modules, which are the modules that interface with the users. The logic layer consists of the trustworthiness criteria and metadata creation modules. The trustworthiness criteria module is composed of four basic criteria, namely: authority, accuracy, recency and relevance. Each criterion consists of the items, called indicators, in order to indicate the trustworthiness of Web information based on their criteria. The metadata creation module gathers and integrates metadata based on the proposed criteria that will then be used in the output module in order to generate the supportive information for users. The framework was evaluated based on the tool, using an empirical study. The study set a scenario that new postgraduate students search for publications to use in their report using the developed tool. The students were then asked to complete a questionnaire, which was then analysed using quantitative and qualitative methods. The results from the questionnaire show that the confidence level of users when evaluating the trustworthiness of Web information does increase if they obtain useful supportive information about that Web information. The mean of the confidence level of their judgments increases by 12.51 percentage points. Additionally, the number of selected pieces of Web information used in their work does increase when supportive information is provided. The number of pieces of Web information selected by the users increases on average less than one percentage points. Participating users were satisfied with the supportive information, insofar as it helps them to evaluate the trustworthiness of Web information, with the mean satisfaction level of 3.69 of 5 points. Overall the supportive information provided, based on and provided by the framework, can help users to adequately evaluate the trustworthiness of Web information.
APA, Harvard, Vancouver, ISO, and other styles
10

Antonellini, Giorgia. "Trustworthiness dei dati nei sistemi di crowdsourcing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8279/.

Full text
Abstract:
Questa tesi affronta la tematica della trustworthiness dal punto di vista dell’utente, a partire dalla sua identità virtuale fino a considerare l’analisi dei parametri che un sito Web dovrebbe adottare perchè sia ritenuto affidabile dagli utilizzatori. Si individueranno quindi le criticità che rendono ancora la trustworthiness una variabile poco considerata nella progettazione di siti Web e gli eventuali accorgimenti e punti di forza che caratterizzano un ambiente di lavoro. La tesi presenta diversi casi esemplificativi di utilizzo, ovvero gli ambienti di commercio elettronico, gli ambienti che condizionano l’acquisto di un utente e i sistemi di knowledge sharing; tutte le analisi di affidabilità sono applicate a siti web che adottano modelli di approvvigionamento dati da parte degli utenti stessi, votazioni e giudizi, recensioni su prodotti e servizi, crowdsourcing di informazioni e di esperienze personali e collettive, basate su progetti di indagine commerciale, analisi e opinione di prodotti o servizi o informazioni condivise per lo sviluppo sociale. La tematica viene analizzata da questi tre punti di vista, ciascuno sotto l’ottica identitaria, di reputazione e di affidabilità. La letteratura, come esaminato in questa tesi, propone alcuni modelli che individuano criteri di valutazione dell’affidabilità dei siti web, su algoritmi già esistenti quindi su siti Web che possiedono sistemi di filtraggio del contenuto o sistemi di valutazione della reputazione o meccanismi di raccomandazione per individuare le intenzioni dell’utente; in altri casi vengono implementati modelli sperimentali e teorie basate su dataset esistenti, per ricercare soluzioni tangibili all’autenticazione di affidabilità di un sistema, compensando la carenza di sistemi di giudizio di trustworthiness su siti Web reali. Vengono proposti alcuni casi d’uso, appartenenti alle categorie prese in oggetto, per esaminare nel dettaglio, le caratteristiche di trustworthiness fornite da ognuno di essi, nel loro campo di applicazione. L’obiettivo è tracciare una mappatura dei principali criteri con cui viene valutata trustworthiness dei dati in qualsiasi ambito d’applicazione della rete, ponendo alcuni criteri fondamentali ed avere così una visione approfondita della problematica.
APA, Harvard, Vancouver, ISO, and other styles
11

Lanford, Patricia. "A model for building trustworthiness in online stores." Auburn, Ala., 2007. http://repo.lib.auburn.edu/07M%20Dissertations/LANFORD_PATRICIA_43.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fourie, R., and D. Lubbe. "Trustworthiness of South African sustainability reports : an overview." Journal for New Generation Sciences, Vol 10, Issue 3: Central University of Technology, Free State, Bloemfontein, 2012. http://hdl.handle.net/11462/616.

Full text
Abstract:
Published Article
It is widely assumed that sustainability reporting is a mechanism that companies can use to demonstrate their trustworthiness with regard to development in a sustainable manner. This article uses the Mayer, Davis and Schoorman trust model as basis to discuss how sustainability reporting can enhance trustworthiness in a sustainable development context. The study also uses a survey-questionnaire, sent to South African sustainability reporters, to explore whether they are finding sustainability reporting useful for enhancing companies' trustworthiness among stakeholders in a sustainable development context. Respondents indicate, amongst other things, that sustainability reporting in South Africa has a role to play in enhancing trustworthiness, more so among contractual stakeholders than among community stakeholders. To entrench trust benefits in the long term will however require long term strategies. Such strategies should focus on increasing the engagement of community stakeholders, authentic use of the GRI and implementing effective control systems that prevent the misuse of sustainability reports, while not preventing the formation of real trust.
APA, Harvard, Vancouver, ISO, and other styles
13

Yao, Jinhui. "Strong accountability for trustworthiness in service oriented systems." Thesis, The University of Sydney, 2012. https://hdl.handle.net/2123/29154.

Full text
Abstract:
Service Oriented Architecture (SOA) enables system designers to combine individual services to form new service network. Along with the wide rage of innovations in the service related technologies (e.g. IaaS, PaaS, SaaS), applications, platforms, infrastructures, provided by different vendors can now be conveniently composed to form unified systems for specific tasks. Whilst such paradigm provides many benefits, it inevitably introduces trust issues. The participants in the system may cross multiple domains with different interests and priorities, they naturally do not trust each other to comply with the SLA and admit their violations. This lack of trustworthiness prevents the paradigm from prospering. In this thesis a compliance monitoring model that enforces strong accountability is designed to enhance the trustworthiness in the service oriented systems. Account— ability refers to the ability of the system to be trustworthy, in another words, strong accountability implies that the system can show its compliance unambiguously and convincingly. It provides means to verify compliance according to evidence in a provable and undeniable way. Several protocols and reasoning algorithms, including trusted evidence logging, probing and voting and compliance interval evaluation are designed to facilitate the notions of strong accountability. Services involved in the collaboration will submit undeniable evidence to multiple dedicated accountability services, which will evaluate their degree of compliance through provable reasoning processes. This thesis also presents the architecture design and implementation of TrustCol— lab — a framework to facilitate trustworthy service oriented collaboration. It allows collaborating services to register and submit information relevant to their business processes during the operation for monitoring. The monitoring task is assigned to multiple monitoring agents — accountability services — which will analyse the received evidence and vote to conclude the compliance of the underlying services.
APA, Harvard, Vancouver, ISO, and other styles
14

Stimolo, Marco. "State-contingent trust and trustworthiness. An experimental analisys." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2582.

Full text
Abstract:
2015 - 2016
This thesis investigates experimentally how the individuals’ state (e.g. economic, labor and social state) influences their trusting and trustworthy behavior in one-shot anonymous interactions. Moreover, it analyzes the way the knowledge of the counterpart’s state mediates subjects’ behavioral trust and trustworthiness. To this aim the thesis proposes two experiments. The first one seeks to identify the systematic differences in trusting and trustworthy behavior amongst individuals’ in different labor market states (i.e. employed, student or NEET) as well as the effect of information on others’ labour market states on subjects’ behavioral trust and trustworthiness. The second experiment aims at identifying the effect of the random variation of subjects’ endowment over their behavioral trust and trustworthiness in three different economic contexts as well as the way in which the information on the counterpart’s state mediates subjects’ trusting and trustworthy behavior. The first experiment shows that the categories of NEET and employed exhibit an internal heterogeneity at the behavioral level. Specifically, the sub-category of NEETs unemployed (i.e. NEET searching for a job without success) are the least trustworthy. By contrast, the other categories of NEETs (NEETs not searching for a job) and employed (specifically those with a permanent contract) are relatively more trusting and trustworthy. The results of the second experiment show that the exogenously induced heterogeneity in state significantly reduces the average level of trust from “Disadvantaged” senders. Similarly, induced heterogeneity reduces the average level of trustworthiness of all the categories of receivers, particularly of “Disadvantaged” ones. By contrast, “Advantaged” players do not exhibit a clear pattern of trusting and trustworthy behavior. Thus, “Disadvantaged” players behave like unemployed NEETs in the first experiment, supporting the hypothesis of a negative causal effect of the unemployed state on trusting and trustworthy behavior. [edited by author]
Questa tesi esamina con metodo sperimentale il modo in cui lo stato degli individui (ad esempio, lo stato economico, sociale e lavorativo) influenza il loro comportamento di fiducia e il loro comportamento affidabile in interazioni anonime non ripetute. Inoltre, la tesi analizza il modo in cui la conoscenza dello stato della controparte influenza il comportamento di fiducia e il comportamento affidabile dei soggetti. A questo scopo la tesi propone due esperimenti. Il primo cerca di individuare le differenze sistematiche nel comportamento di fiducia e nel comportamento affidabile tra gli individui in diversi stati occupazionali (ad esempio occupati, studenti o NEET), nonché l'effetto delle informazioni sugli stati occupazionali degli individui con cui si interagisce sul comportamento di fiducia e sul comportamento affidabile. Il secondo esperimento mira a individuare l'effetto della variazione casuale esogena della dotazione monetaria dei soggetti sui loro livelli di fiducia e affidabilità. Inoltre, l’esperimento analizza il modo in cui le informazioni sullo stato economico della controparte influenzano il comportamento di fiducia e affidabile dei soggetti. Il primo esperimento dimostra che le categorie di NEET ed di occupato esibiscono un'eterogeneità interna al livello comportamentale. Specificamente, i NEET disoccupati (i.e. NEET che cercano un lavoro senza successo) sono i meno affidabili, mentre gli individui appartenenti alle altre sotto-categorie di NEET (NEETs che non cercano un lavoro) ed gli occupati (specificamente quelli con un contratto di lavoro permanente) sono relativamente più fiduciosi e affidabili. I risultati del secondo esperimento dimostrano che la determinazione esogena e casuale dello stato riduce il livello di fiducia e di affidabilità dei soggetti svantaggiati. Di contro, i giocatori avvantaggiati non esibiscono una chiara regolarità nel loro comportamento. Quindi, i giocatori svantaggiati si comportano come i NEETs disoccupati nel primo esperimento: questa evidenza supporta l'ipotesi di un effetto causale e negativo dello stato di disoccupato sul comportamento di fiducia e sul comportamento affidabile. [a cura dell'autore]
XV n.s. (XXIX)
APA, Harvard, Vancouver, ISO, and other styles
15

Longloy, Mary Margaret. "The principal's trustworthiness: the impact on effective school leadership as perceived by teachers on selected campuses in the North East Independent School District." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4952.

Full text
Abstract:
The primary purpose of the study was to identify the effective school leadership behaviors that build trust with teachers, as perceived by teachers on selected campuses in the North East Independent School District. A secondary purpose of the study was to determine whether demographic variables, such as gender, experience, and level of teaching, influence the relationship between teacher trust and effective school leadership. Of the 3,974 teachers in the district, 457 teachers were surveyed from one high, two middle, and four elementary schools. Findings in the study include the following: 1. The behaviors that had mean scores reflecting ratings closest to being critically important to building teacher trust were that the principal maintains confidentiality (4.76), is a good listener (4.73), gathers sufficient information before drawing a conclusion (4.61), reacts calmly in a crisis (4.59), and communicates clear expectations (4.55). 2. The Administrator Rating Form, developed by Ferris (1994), divided all the behaviors into three categories: (a) general professional, (b) personal authenticity, and (c) supervision/evaluation behaviors. The supervision/ evaluation behaviors were the least important of the three groups with a mean score of 4.14. This concludes that the general professional and authenticity behaviors result in building more trust than the supervision/evaluation behaviors. 3. It was determined that females show higher levels of trust in their administrators than that of their male counterparts. The teachers’ number of years of experience had no effect on how they responded. Within the category of general professional behaviors of the principal, there was no significant difference in the responses of the three teaching levels. Within the other two categories, however, there was a significant difference in the responses of the three teaching levels. The following recommendations are based on the findings and conclusions: 1. The principal must maintain confidentiality and be a good listener. 2. Principals should establish a professionally personal relationship with each teacher. 3. Principals should be aware that: (a) male teachers are less trusting than female teachers, (b) teachers’ years of experience has no bearing on building trust, and (c) elementary teachers are generally more trusting than secondary teachers.
APA, Harvard, Vancouver, ISO, and other styles
16

Stevenson, Dennis Eugene. "Determining the trustworthiness of testimonies in marriage nullity cases." Theological Research Exchange Network (TREN), 1996. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Franta, Pamela J. "A validation study of Shaw's assessment of organizational trustworthiness /." free to MU campus, to others for purchase, 2000. http://wwwlib.umi.com/cr/mo/fullcit?p9974629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

LaValley, Christopher Travis. "Holistic Model of Website Design Elements that Influence Trustworthiness." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/812.

Full text
Abstract:
Trustworthiness of a website relies foremost on a good first impression which includes the visitor’s perception of the user interface. The focus of this research is to investigate the effects of website design elements on user perception of trustworthiness of a site and provide a set of guidelines for website designers. The research design is based on Yosef Jabardeen’s (2009) “conceptual framework analysis”. In this research paper, a holistic model is developed to depict the relationships among website design elements and trustworthiness. The model was tested, validated and updated using the results of the repertory grid technique, a process that elicits perceptions about a topic from an individual. For this research, the topic was website trust, the objects were the website design elements, and the constructs were elicited perceptions regarding those website design elements. The repertory grid technique was applied in two stages to a set of participants made up of website users and website designers. Analysis yielded useful information regarding website design associations and correlations of perceptions. The research findings confirmed original suggestions regarding associations and produced an updated, validated model of website design elements. The research indicated that while all design elements had their importance regarding trust, those elements that provided for the function and security of the website rated the highest in importance and expectation. The validated model will aid website designers in understanding what elements are appealing to the visual senses and conjure credibility and trust. Most importantly, this new understanding may help designers to create websites that attract and retain new users and establishing a successful presence on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
19

Lewis, Elissa E. "Effects of source and crisis attribution on organisational trustworthiness in news media reporting." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/119037/1/Elissa_Lewis_Thesis.pdf.

Full text
Abstract:
In an age of fake news and churn-based journalism (or churnalism), how media process content to create news is a vital for readers and the organisations that use news media as a communication channel during crises. This study builds on existing research in the field of crisis communication to elaborate how media content such as sources and their attributions of blame influences trust during an organisational crisis event.
APA, Harvard, Vancouver, ISO, and other styles
20

Samuelsson, Johanna, and Evelina Tornhed. "A world full of influences : A quantitative study on how Generation Z’s view of a brand’s trustworthiness are affected by Influencers wrongdoings." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-95312.

Full text
Abstract:
Problem definition: Along with a rapid growth of Internet usage new forms of communication and marketing have occurred. Influencer marketing have become a popular marketing form, but are brand’s aware of the risk it involves when collaborating with an influencer? This thesis examines how a brand’s trustworthiness can be affected by an influencer’s wrongdoing, in the perception of the critical generation - Generation Z. Purpose: Since Generation Z are a digital and critical generation who rely on influencers recommendations, but also value trustworthiness and transparency from a brand, we want to explore how Generation Z’s perceived trustworthiness of a brand change when an influencer connected to a brand makes a wrongdoing. Research question: This thesis consist of two research questions.  RQ1: Can there be a relationship between an influencers trustworthiness and a brand’s trustworthiness in Generation Z’s perception?    RQ2: How does an Influencers wrongdoing spill over on Generation Z’s perception of a brand’s trustworthiness depending on the brands reaction?  Methodology: The study is based on a quantitative method with a deductive approach. The empirical data was collected through a online survey that was answered by 148 respondents. The data were then analyzed through SPSS. Hypotheses developed from the research questions were then accepted or rejected.  Conclusion: The study resulted in that there is a weak relationship between Generation Z’s perception of an influencer’s trustworthiness and a brand’s trustworthiness. Furthermore, the findings from the survey resulted in that there is a negative spillover effect on brand’s trustworthiness regardless on how they act on an influencer’s wrongdoing.
APA, Harvard, Vancouver, ISO, and other styles
21

Bushey, Jessica. "The archival trustworthiness of digital photographs in social media platforms." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/57606.

Full text
Abstract:
No longer objects held in the hand, photographs are streams of bits, shared instantaneously across screens. From selfies to war reportage, the widespread use of smartphones for taking digital photographs and transmitting them to social media platforms is introducing new social practices, technological processes and legal contexts for record-making and recordkeeping, which impact the trustworthiness of digital photographs. This dissertation investigates current information practices by individuals for creating, managing, sharing and storing digital photographs. The research focuses on the factors that support or hinder the reliability, accuracy and authenticity of digital photographs. Using a qualitative research design, it explores how individuals’ activities and perceptions impact the value of digital photographs held in social media platforms as potential records to be acquired and preserved by archival institutions. A web-based survey reached social media members worldwide, and semi-structured interviews gathered in-depth data from a sample of survey participants. The research found that individuals are members of multiple social media platforms and are actively sharing large quantities of personal digital photographs with friends, social media communities and the open Web. It also revealed that individuals are adding contextual information to their digital photographs, before and after upload to social media platforms, for the purposes of communicating the intent of the photographer and the meaning of the photograph, and of participating in storytelling; however, the procedures for managing and storing user-generated content performed by social media services place the digital photographs and their associated metadata at significant risk of alteration and loss. The research found that the policies of social media services are buried within complex Terms of Use that few members read, introducing the potential for individuals to accumulate personal digital collections or archives online without understanding the extent of ownership, privacy, reuse, and future access. The research found that individuals’ attribute long-term value to the copies of digital photographs held on their personal devices prior to sharing online; whereas, the copies circulated in social media platforms are ephemeral, quickly consumed and then forgotten. Individuals have not made plans to delete, transfer or preserve collections of photographs held within social media services.
Arts, Faculty of
Library, Archival and Information Studies (SLAIS), School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
22

Sekhon, Harjit Singh. "Evaluating trust and trustworthiness : the case of UK financial services." Thesis, University of Nottingham, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Templeton, James Robert. "Trust and Trustworthiness: A Framework for Successful Design of Telemedicine." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/321.

Full text
Abstract:
Trust and its antecedents have been demonstrated as a barrier to the successful adoption of numerous fields of technology, most notably e-commerce, and may be a key factor in the lack of adoption or adaptation in the field of telemedicine. In the medical arena, trust is often formed through the relationships cultivated over time via clinician and patient. Trust and interpersonal relationships may also play a significant role in the adoption of telemedicine. The idea of telemedicine has been explored for nearly 30 years in one form or another. Yet, despite grandiose promises of how it will someday significantly improve the healthcare system, the field continues to lag behind other areas of technology by 10 to 15 years. The reasons for the lack of adoption may be many given the barriers that have been observed by other researchers with regards to trust and trustworthiness. This study examined the role of trust from various aspects within telemedicine, with particular emphasis on the role that trust plays in the adoption and adaptation of a telemedicine system. Simulators examined the role of trust in the treatment and management of diabetes mellitus (common illness) in order to assess the impact and role of trust components. Surveys of the subjects were conducted to capture the trust dynamics, as well as the development of a framework for successful implementation of telemedicine using trust and trustworthiness as a foundation. Results indicated that certain attributes do influence the level of trust in the system. The framework developed demonstrated that medical content, disease state management, perceived patient outcomes, and design all had significant impact on trust of the system.
APA, Harvard, Vancouver, ISO, and other styles
24

Day, Elizabeth Hebert. "Development and validation of an inventory of perceived counselor trustworthiness /." The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487935958844839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Blomqvist, Niklas. "Perception of Trustworthiness and Valence of Emotional Expressions in Virtual Characters." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189546.

Full text
Abstract:
Knowledge on how to design trustworthy virtual characters are of importance when these are becoming more and more common interaction partners. In this study, a closer look at the suggested relationship from previous research between valence and trustworthiness is investigated by constructing virtual characters with different non-verbal behaviours and letting participants rate them in a pre-study. A second question of how perception of trustworthiness is based for virtual characters is investigated by letting participants play a trust game with life-sized virtual characters on a big 4k-screen. Results indicated that valence is not necessarily a factor influencing trustworthiness and that positive valence together with mutual gaze is not enough to provide a clearly trustworthy virtual character. Results also indicated that perception of trustworthiness is not based solely on a virtual character's previous decisions of trust in a longer interaction but also on its non-verbal behaviour. The outcome of this study will help when constructing virtual characters in different scenarios, especially when the goal is to make them as trustworthy as possible. The study also gives insight into tools and software that can be used when creating virtual characters and setting up scenarios of trust.
APA, Harvard, Vancouver, ISO, and other styles
26

Mollick, Joseph Sudeep. "Privacy policies, fairness, trustworthiness and willingness to transact with firms online /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1068219661&sid=12&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kharouf, H. "Relationship marketing : an evaluation of trustworthiness within the Jordanian hotel sector." Thesis, Coventry University, 2010. http://curve.coventry.ac.uk/open/items/3e306176-578f-259b-0c04-5fb3451b3e2b/1.

Full text
Abstract:
The objective of this study is to investigate the concept of trustworthiness and then examine its effect within the venue of the hotel sector. Given trustworthiness accepted importance to relationship marketing, there appears to be a failure to develop a coherent framework to indicate trustworthiness. This is a gap that this thesis addresses and by doing so, it will extend the body of knowledge by contributing to our understanding of the construct and its determinants. The main hypothesis in this thesis is identifying the determinants of trustworthiness with an outcome as part of a causal model. Within the proposed model, the determinants; consistency, competence, integrity, benevolence, value alignment and communication are assumed to have a positive impact on trustworthiness. In turn, trustworthiness has a positive impact on both attitudinal loyalty and behavioural loyalty, the two types of loyalty are proposed as the model outcome, whereas the previous six determinants are proposed as antecedents of trustworthiness. In order to test the proposed hypotheses, a new measurement scale was developed in order to evaluate trustworthiness with its determinants and outcome, the model was tested within the hotel sector in Jordan where over 526 respondents took part in the main survey collection, 60 respondents participated in the pilot study along with 11 interviewees. The results from the empirical study revealed that the hypothesised model is valid and significant, in which all the antecedents of trustworthiness had a significant loading as well as the model corollaries. These loadings vary in its significance and strength; this created a clearer picture on the expected impact of each of these determinants once the model being applied within service organisations.
APA, Harvard, Vancouver, ISO, and other styles
28

Amin, Saman Hameed. "Optimising routing and trustworthiness of ad hoc networks using swarm intelligence." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8248.

Full text
Abstract:
This thesis proposes different approaches to address routing and security of MANETs using swarm technology. The mobility and infrastructure-less of MANET as well as nodes misbehavior compose great challenges to routing and security protocols of such a network. The first approach addresses the problem of channel assignment in multichannel ad hoc networks with limited number of interfaces, where stable route are more preferred to be selected. The channel selection is based on link quality between the nodes. Geographical information is used with mapping algorithm in order to estimate and predict the links’ quality and routes life time, which is combined with Ant Colony Optimization (ACO) algorithm to find most stable route with high data rate. As a result, a better utilization of the channels is performed where the throughput increased up to 74% over ASAR protocol. A new smart data packet routing protocol is developed based on the River Formation Dynamics (RFD) algorithm. The RFD algorithm is a subset of swarm intelligence which mimics how rivers are created in nature. The protocol is a distributed swarm learning approach where data packets are smart enough to guide themselves through best available route in the network. The learning information is distributed throughout the nodes of the network. This information can be used and updated by successive data packets in order to maintain and find better routes. Data packets act like swarm agents (drops) where they carry their path information and update routing information without the need for backward agents. These data packets modify the routing information based on different network metrics. As a result, data packet can guide themselves through better routes. In the second approach, a hybrid ACO and RFD smart data packet routing protocol is developed where the protocol tries to find shortest path that is less congested to the destination. Simulation results show throughput improvement by 30% over AODV protocol and 13% over AntHocNet. Both delay and jitter have been improved more than 96% over AODV protocol. In order to overcome the problem of source routing introduced due to the use of the ACO algorithm, a solely RFD based distance vector protocol has been developed as a third approach. Moreover, the protocol separates reactive learned information from proactive learned information to add more reliability to data routing. To minimize the power consumption introduced due to the hybrid nature of the RFD routing protocol, a forth approach has been developed. This protocol tackles the problem of power consumption and adds packets delivery power minimization to the protocol based on RFD algorithm. Finally, a security model based on reputation and trust is added to the smart data packet protocol in order to detect misbehaving nodes. A trust system has been built based on the privilege offered by the RFD algorithm, where drops are always moving from higher altitude to lower one. Moreover, the distributed and undefined nature of the ad hoc network forces the nodes to obligate to cooperative behaviour in order not to be exposed. This system can easily and quickly detect misbehaving nodes according to altitude difference between active intermediate nodes.
APA, Harvard, Vancouver, ISO, and other styles
29

Bani-Mustafa, Tasneem. "Multi-Hazards Risk Aggregation Considering the Trustworthiness of the Risk Assessment." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC096.

Full text
Abstract:
Cette thèse de doctorat aborde le problème de l'agrégation de risques multiple (MHRA), qui vise à agréger les risques estimés pour différents contributeurs. La pratique actuelle de la MHRA est basée sur une sommation arithmétique simple des estimations de risques. Cependant, ces estimations sont obtenues à partir de modèles EPS (Estimation Probabiliste de risque) qui présentent des degrés de réalisme différents liés à différents niveaux de connaissances. En ne prenant pas en compte ces différences, le processus MHRA pourrait conduire à des résultats trompeurs pour la prise de décision (DM). Dans cette thèse, un cadre structuré est proposé afin d’évaluer le niveau de réalisme et de confiance dans les évaluations de risques et de l’intégrer dans le processus de MHRA. Ces travaux ont permis : (i) Une identification des facteurs contribuant à la fiabilité de l'évaluation des risques. Leurs criticités sont analysées afin de comprendre leur influence sur l’estimation des risques; (ii) Un cadre hiérarchique intégré est développé pour évaluer la confiance et le réalisme de l'estimation de risque, sur la base des facteurs et des attributs identifiés en (i); (iii) Une méthode basée sur un modèle réduit est proposée pour évaluer efficacement la fiabilité de l'évaluation des risques dans la pratique. Grâce à cette méthode, le nombre d'éléments pris en compte dans l'évaluation initiale des risques peut être limité. (iv) Une technique qui combine la théorie de Dempster-Shafer et le processus de hiérarchie analytique (DST-AHP) est appliquée au modèle développé. Cette technique permet d’évaluer le niveau de réalisme et confiance -dans l’analyse de risque- en utilisant une moyenne pondérée des attributs: la méthode AHP est utilisée pour calculer le poids des attributs et la méthode DST est utilisée pour tenir compte de l'incertitude subjective dans le jugement des experts dans l'évaluation des poids; (v) Une technique de MHRA est développée sur la base d'un modèle de moyenne bayésienne afin de surmonter les limites de la pratique actuelle de MHRA qui néglige le réalisme et confiance dans l'évaluation de chaque contributoire de risque; (vi) Le modèle développé est appliqué sur des cas réels de l'industrie des centrales nucléaires
This PhD thesis addresses the problem of Multi-Hazards Risk Aggregation (MHRA), which aims at aggregating the risk estimates from Probabilistic Risk Assessment (PRA) models for the different contributors. The current practice of MHRA is based on a simple arithmetic summation of the risk estimates. However, the risk estimates are obtained from PRA models that have different degrees of trustworthiness, because of the different background knowledge they are based on. Ignoring this difference in MHRA could lead to misleading results for Decision-Making (DM). In this thesis, a structured framework is proposed to assess the level of trustworthiness, which risk assessment results are based on and to integrate it in the process of MHRA. The original scientific contributions are: (i) Factors contributing to the trustworthiness of risk assessment outcomes are identified and their criticalities are analyzed under different frameworks, to understand their influence on the risk results; (ii) An integrated hierarchical framework is developed for assessing the trustworthiness of risk analysis, based on the identified factors and related attributes; (iii) A reduced order model-based method is proposed to efficiently evaluate the trustworthiness of risk assessment in practice. Through the reduced-order model, the proposed method can limit the number of elements considered in the original risk assessment; (iv) A technique that combines Dempster Shafer Theory and the Analytic Hierarchy Process (namely, DSTAHP) is applied to the developed framework to assess the trustworthiness by a weighted average of the attributes in the framework: the AHP method is used to derive the weights of the attributes and the DST is used to account for the subjective uncertainty in the experts’ judgments for the evaluation of the weights; (v) A MHRA technique is developed based on Bayesian model averaging, to overcome the limitations of the current practice of risk aggregation that neglects the trustworthiness of the risk assessment of individual hazard groups; (vi) The developed framework is applied to real case studies from the Nuclear Power Plants (NPP) industry
APA, Harvard, Vancouver, ISO, and other styles
30

Islam, Mohammad. "Measuring trustworthiness of image data in the internet of things environment." Thesis, Federation University Australia, 2021. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/177521.

Full text
Abstract:
Internet of Things (IoT) image sensors generate huge volumes of digital images every day. However, easy availability and usability of photo editing tools, the vulnerability in communication channels and malicious software have made forgery attacks on image sensor data effortless and thus expose IoT systems to cyberattacks. In IoT applications such as smart cities and surveillance systems, the smooth operation depends on sensors’ sharing data with other sensors of identical or different types. Therefore, a sensor must be able to rely on the data it receives from other sensors; in other words, data must be trustworthy. Sensors deployed in IoT applications are usually limited to low processing and battery power, which prohibits the use of complex cryptography and security mechanism and the adoption of universal security standards by IoT device manufacturers. Hence, estimating the trust of the image sensor data is a defensive solution as these data are used for critical decision-making processes. To our knowledge, only one published work has estimated the trustworthiness of digital images applied to forensic applications. However, that study’s method depends on machine learning prediction scores returned by existing forensic models, which limits its usage where underlying forensics models require different approaches (e.g., machine learning predictions, statistical methods, digital signature, perceptual image hash). Multi-type sensor data correlation and context awareness can improve the trust measurement, which is absent in that study’s model. To address these issues, novel techniques are introduced to accurately estimate the trustworthiness of IoT image sensor data with the aid of complementary non-imagery (numeric) data-generating sensors monitoring the same environment. The trust estimation models run in edge devices, relieving sensors from computationally intensive tasks. First, to detect local image forgery (splicing and copy-move attacks), an innovative image forgery detection method is proposed based on Discrete Cosine Transformation (DCT), Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. Using Support Vector Machine (SVM), the proposed method is extensively tested on four well-known publicly available greyscale and colour image forgery datasets and on an IoT-based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples. Second, a robust trust estimation framework for IoT image data is proposed, leveraging numeric data-generating sensors deployed in the same area of interest (AoI) in an indoor environment. As low-cost sensors allow many IoT applications to use multiple types of sensors to observe the same AoI, the complementary numeric data of one sensor can be exploited to measure the trust value of another image sensor’s data. A theoretical model is developed using Shannon’s entropy to derive the uncertainty associated with an observed event and Dempster-Shafer theory (DST) for decision fusion. The proposed model’s efficacy in estimating the trust score of image sensor data is analysed by observing a fire event using IoT image and temperature sensor data in an indoor residential setup under different scenarios. The proposed model produces highly accurate trust scores in all scenarios with authentic and forged image data. Finally, as the outdoor environment varies dynamically due to different natural factors (e.g., lighting condition variations in day and night, presence of different objects, smoke, fog, rain, shadow in the scene), a novel trust framework is proposed that is suitable for the outdoor environments with these contextual variations. A transfer learning approach is adopted to derive the decision about an observation from image sensor data, while also a statistical approach is used to derive the decision about the same observation from numeric data generated from other sensors deployed in the same AoI. These decisions are then fused using CertainLogic and compared with DST-based fusion. A testbed was set up using Raspberry Pi microprocessor, image sensor, temperature sensor, edge device, LoRa nodes, LoRaWAN gateway and servers to evaluate the proposed techniques. The results show that CertainLogic is more suitable for measuring the trustworthiness of image sensor data in an outdoor environment.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
31

Antonsson, Roger, and Lena Petterson. "Think big : for small - infusing confidence, security and trustworthiness for mobile services." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3535.

Full text
Abstract:
The use of mobile telephony has over the past years increased and consequently has the development of services over the mobile phone also increased. This semester we have taken part in a large system development project, our contributions have been designing the graphical user interfaces. In doing that we found the problem with how to mediate trust to a user through a graphical user interface interesting. In this thesis we are focusing on how to develop graphical user interfaces for a mobile phone service that radiate and infuse confidence, security and trustworthiness. In order to attain the purpose, we have used the combination of literature studies and to some extent user involvement with Mock-ups and a Think-aloud technique. We are also describing the importance of taking as well usability and usability goals as the needs for the end users into consideration. We have found that more research on how to radiate and infuse trust through a graphical user interface is needed. This thesis is concluded with some aspects on that subject that we think is important to have in mind. It is of great importance to never leave the user in a state of uncertainty and therefore is clear, sincere and informative feedback necessary throughout the service. Also central in designing graphical user interfaces is to make sure that there is no mismatch in the security of the system and the radiated security.
Användningen av mobiltelefoner har de senaste åren ökat, det har även utvecklingen av tjänsterna till mobiltelefoner. Under denna termin har vi deltagit i ett större systemutvecklingsprojekt och vår del har varit att designa det grafiska användargränssnittet. Under projektets gång har vi intresserat oss för problemet, hur tillit kan förmedlas till användaren genom det grafiska användargränssnittet. I den här rapporten fokuserar vi på hur man utvecklar grafiska användargränssnitt för en mobiltelefonservice som utstrålar och ingjuter förtroende, säkerhet och trovärdighet. För att uppnå vårt syfte har vi använt en kombination av litteraturstudier och till viss utsträckning användarmedverkan med Mock-uper och en Tänka-högt teknik. Vi beskriver även vikten av tänka på såväl använbarhet som använbarhetsmål som användarnas behov. Vi har funnit att det behövs mer forskning om hur man utstrålar och ingjuter tillit genom ett grafiskt användargränssnitt. Uppsatsen avslutas med några av våra synpunkter på vad som är viktiga att ha i åtanke. Det är av stor betydelse att aldrig låta en användare sväva i ovisshet och därför är det nödvändigt med tydlig, korrekt och informativ återkoppling genom hela tjänsten. Centralt vid design av grafiska användargränssnitt är också att förvissa sig om att det inte är någon skillnad mellan säkerheten i systemet och säkerheten som utstrålas.
APA, Harvard, Vancouver, ISO, and other styles
32

Long, Erin. "The Rockefeller Foundation and the public's perception of its trustworthiness, 1911-1913." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 114 p, 2007. http://proquest.umi.com/pqdweb?did=1338866241&sid=20&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Terzi, Paschalia. "Establishment of trustworthiness in the digitization project'International Dunhuang Project' : Authenticity and transparency." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-814.

Full text
Abstract:
Cultural institutions that hold unique and valuable physical items only for restricted access untilnow are experiencing a change that demands them to take up the role of information providers aswell. International Dunhuang Project is a digitization project that has been taken as an example toinvestigate this phenomenon and more particularly issues of trustworthiness and how it can beestablished in the digital environment. Two concepts have been found to form the basis of itsassessment in the online world, authenticity and transparency. Authenticity is a concept borrowedfrom the existing practice of cultural institutions like museums and archives but transparency is anew demand that has come along with internet and the WWW. Through the examination ofcomponents of IDP's website like online documents, metadata and images along with interviewswith the producers of the project, an attempt has been made to understand how trustworthiness isperceived by the producers of the project and how they have implemented it on the material of theirwebsite.
Kulturinstitutioner som hittills bara gett endast begränsadtillgång till sina samlingar av unika och värdefulla fysiskaexemplar upplever nu en förändring som kräver att de ävenintar rollen som informationsleverantörer.Digitaliseringsprojektet International Dunhuang Projectanvänds som exempel i en undersökning om detta fenomen,i synnerhet kring frågor om trovärdighet och hur det kanfastställas i den digitala miljön. Två begrepp har visat sigligga till grund för bedömning av trovärdighet ionlinevärlden: autenticitet och genomsynlighet.Autenticitet är ett begrepp som lånats från befintliga praxishos kulturinstitutioner som museer och arkiv, mengenomsynlighet är ett nytt krav som tillkommit samtidigtsom internet och WWW. Genom undersökning av de olikaelement på IDP:s webbplats, t ex. online-dokument,metadata och bilder, tillsammans med intervjuer medprojektskaparna, har ett försök gjorts att förstå hurtrovärdighet uppfattas av projektskaparna och hur det harimplementerats på materialet på deras webbplats.

Acknowledgments:I would like to thank the staff of the International Dunhuang Project, Ms. Susan Whitfield, Ms. VicSwift, Ms. Emma Goodliffe and Mr. Sam van Schaik for all the support they have offered meduring my stay at the British Library. This study would not have been completed without their helpand their insights. Also, I would like to thank my supervisor Mr. Mats Dahlstrom and Ms. ElenaMaceviciute, for their patience and the knowledge and tools they have provided me for therealization of this study. Moreover, Ms. Anna Brynolf who translated the abstract into Swedish.Lastly, Mr. Osama Mansour and Ms. Nina Hult for their comments which helped me to improve theshortcomings of my text.

APA, Harvard, Vancouver, ISO, and other styles
34

Roussin, Christopher Jay. "The Influence of Experiential Grounding on Attributions of Initial Trustworthiness at Work." Thesis, Boston College, 2008. http://hdl.handle.net/2345/714.

Full text
Abstract:
Thesis advisor: William F. Stevenson
An important and basic question, highly-relevant to managerial practice, which has been only partially asked and answered in the organizational literature, concerns the development of initial trust among co-workers. In this dissertation, I develop and test the theoretical idea that individual reflection upon affectively-charged work experience will have considerable influence on present attributions of initial trustworthiness to co-workers. The theory is primarily based in the scholarly literature on attribution theory, affective forecasting and trust concepts. Empirical results from testing across three distinct vignette-based scenarios show that the valence of relevant indirect experience is significantly and positively related to the level of initially attributed trustworthiness. Two experiential indicators, relational self-efficacy and organizational identification, are also found to be situationally and positively related to the level of initially attributed trust. The discussion details important implications for scholarship and management practice
Thesis (PhD) — Boston College, 2008
Submitted to: Boston College. Carroll School of Management
Discipline: Organization Studies
APA, Harvard, Vancouver, ISO, and other styles
35

Grace, Anthony Richard. "The Function of Franchisee Trust and Franchisor Trustworthiness within the Franchising Relationship." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367904.

Full text
Abstract:
This dissertation serves three major purposes: (1) to create new knowledge in the domain of franchising research, (2) to assist future academic inquiry by advancing agency theoretical understanding, and (3) to serve members of the franchising community by developing a framework for building franchisee trust. It is proposed that trust within the franchising relationship is important for overall franchisee performance, as well as necessary for uniting the franchisee and the franchisor in their mutually beneficial endeavours. Franchisee trust and franchisor trustworthiness are considered to have a central function within the franchising relationship and through empirical examination, both qualitative and quantitative data provided confirmation of this proposition. 30 interviews were conducted with franchising experts, franchisees, and franchisors, until data saturation was achieved. The interviews were audio recorded, with the permission of the interviewee, then transcribed. Analysis of the transcripts, assisted by Nvivo software, provided insight and preliminary answers to the five research questions: (RQ1) how is franchisee trust understood within the franchising sector? (RQ2) Can authentic trust exist within the franchising relationship? (RQ3) What are the barriers to building franchisee trust? (RQ4) How is franchisee trust built in the franchisor? (RQ5) What role does trust play in franchisee performance?
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
Grifffith Business School
Griffith Business School
Full Text
APA, Harvard, Vancouver, ISO, and other styles
36

Campos-Castillo, Celeste. "Trustworthiness and influence in task groups focused on a single group member." Diss., University of Iowa, 2012. https://ir.uiowa.edu/etd/3272.

Full text
Abstract:
Task groups focused on helping a single group member perform well on a task, or the advice-seeking situation, is a familiar occurrence in everyday life: patients and physicians work together to help the patient manage his or her quality of life, students and teachers work together to ensure that the student achieves academic success, and lawyers meet with clients to organize evidence in favor of the client. Rare, however, is the formal application of group process theories to understand these situations. The omission is particularly unfortunate given the preponderance of research documenting inequities in the outcomes for the focal team member, such as the provision of health care to patients. Group process theories are rich with formal statements that explain the processes by which such inequities occur and sustain themselves, which can then be used to develop interventions. The goal of this dissertation is to present such an application in a variety of populations and settings.
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Brydon. "The role of trustworthiness in automated decision-making systems and the law." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/231388/1/Brydon_Wang_Thesis.pdf.

Full text
Abstract:
This thesis considers the role of trustworthiness in automated decision-making systems (ADS) spanning across data collection, modelling, analysis and decision output in different legal contexts. Through an updated model of trustworthiness, it argues that existing legal norms and principles for administering construction contracts and the impact of automation on these contracts provide fertile ground to inform the governance of algorithmic systems in smart cities. The thesis finds that trustworthy, benevolent ADS requires a specific form of transparency that operates through mutual vulnerability in the trusting relationship, and seams in the automated decision-making process where human discretion is exercised.
APA, Harvard, Vancouver, ISO, and other styles
38

Kim, Jangyul Robert. "An experimental test of public relations messages sidedness, and corporate goodwill and trustworthiness /." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0015404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Xiaohang, and Olle Falkenäng. "Exploring the Concepts which Constitute the Perception of Trustworthiness in Virtual Sponsored Communities." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176667.

Full text
Abstract:
The development of virtual sponsored communities has created great possibilities for people and companies to interact on shared platforms. To create interaction in the community, it is essential to create the perception of trustworthiness of the community. The purpose of this study is to examine which concepts of trust-building constitute the perception of trustworthiness of virtual sponsored communities. A theoretical framework based on previous studies on trust-building in virtual communities is used to provide the basis for our empirical studies. The paper examines the virtual sponsored community of an online video game, World of Warcraft, with both quantitative surveys and qualitative netnographical observations to determine the important concepts which affect the perception of trustworthiness of the community from the perspectives of the sponsor and the gamers. Our findings show that the concepts of quality content, privacy policy, interaction, knowledge growth, satisfaction, embeddedness, shared value and perceived responsiveness constitute the perception of trustworthiness of the virtual sponsored community. The findings also show implications for causal relationships between the concepts affecting the perception of trustworthiness for future studies.
APA, Harvard, Vancouver, ISO, and other styles
40

au, D. Hynd@murdoch edu, and Dale Hynd. "The new spin: Effects of information control behaviours on source trustworthiness and persuasion." Murdoch University, 2007. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20090831.143959.

Full text
Abstract:
Given the high level of skepticism from the public toward politicians, this research explores the communication styles that separate public figures who are trusted and supported from those who are not. Contrary to conventional practice, it is argued that the use of ‘spin’ in political communication is a large factor contributing to the public’s negative perception of politicians. Political spin is defined as a communication style encompassing specific behaviours designed to appeal to the media, control information, and contain the meaning audiences derive from a message. This research operationalised spin as it is used in political communication and compared participants’ responses to messages with low and high levels of spin. The present research comprised three studies. In Study One, interviews were conducted with communication professionals to define the concept and specific ‘information control behaviours’ associated with spin. An ‘authenticity’ scale was then developed to measure audience responses to low and high-spin messages. In Study Two, 50 participants were randomly assigned to view a series of low or high-spin political messages. Participants rated messages from a confederate politician as well as actual politicians, government officials, and corporate representatives using the Authenticity Scale. Study Three was conducted throughout the 5-weeks of political campaigning prior to a general election. A representative sample of 60 voters was used each week in a repeated measures design to rate the political candidates and two confederate politicians using the Authenticity Scale. It was found that participants were able to clearly discern the degree of spin used by politicians when communicating a message. Messages containing a high level of spin elicited more negative attitudes and significantly lower levels of support for politicians, than messages containing a low level of spin. Specifically, participants’ perceptions of source trustworthiness and credibility were significantly higher for politicians using a low-spin style of communication. The findings are discussed in terms of the expectancy disconfirmation theory. The findings suggest that adopting a new low-spin style of communication will assist public figures to communicate more persuasively and to better engage an increasingly skeptical public.
APA, Harvard, Vancouver, ISO, and other styles
41

Jahn, Johannes [Verfasser]. "Transparency and Trustworthiness in CSR Communication : Normative considerations and empirical evidence / Johannes Jahn." Berlin : ESCP Europe Wirtschaftshochschule Berlin, 2018. http://d-nb.info/1169162851/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Abell, Meghann Lynn. "Assessing Fraud Risk, Trustworthiness, Reliability, and Truthfulness: Integrating Audit Evidence from Multiple Sources." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/27763.

Full text
Abstract:
To assess fraud risk, auditors collect evidence in a sequential manner by reviewing workpaper documentation, and by collecting corroborating and clarifying information from financial (management) personnel and nonfinancial (operating) personnel. SAS 99 (AICPA, 2002) noted that audit evidence gathered from financial personnel may be susceptible to deception. In addition, prior researchers have found auditors to be poor at detecting deception immediately following deceptive communication. Though the audit process is sequential and iterative, these studies measured auditors– ability to detect deception at a single point and did not provide corroborating evidence after the deceptive communication for auditors to revise their judgments. In this study, I examined auditors’ fraud risk assessments and truthfulness judgments throughout the audit process when there was an attempt at deception by management (financial) personnel. The belief adjustment model provided a framework to examine auditors’ initial judgments, their judgments directly following a deception attempt by financial personnel, and their judgments after receiving corroborating evidence from nonfinancial personnel. Sixty-four experienced auditors electronically completed one of four randomly assigned cases and, within each case, assessed the fraud risk, truthfulness, trustworthiness, and reliability of financial personnel at multiple points for a fictitious client. I manipulated the presence (absence) of fraud and the level of experience of the source of corroborating evidence (operating personnel). I hypothesized that auditors would not be able to differentially evaluate fraud risk and truthfulness judgments of financial personnel between the fraud and no fraud conditions when exposed to workpaper documentation and deceptive client inquiry evidence by management (financial personnel). However, I expected to find that auditors– would update their fraud risk and truthfulness judgments as they reviewed audit evidence from nonfinancial (operating) personnel. The results indicate that auditors in this study are not able to appropriately assess fraud risk and the truthfulness of financial personnel following the review of workpaper and client inquiry evidence. While the client was deceptive in the fraud condition only, auditors did not differentially assess the fraud risk and truthfulness of financial personnel between the fraud and no fraud conditions. After auditors reviewed evidence from nonfinancial personnel, in the presence of fraud, auditors increased their fraud risk and decreased their truthfulness judgments of financial personnel as inconsistent evidence was presented from a corroborating source. Therefore, in the presence of fraud, auditors improved the effectiveness of the audit process by appropriately increasing their fraud risk assessments in light of inconsistent audit evidence from nonfinancial (operating) personnel. Of equal importance, in the absence of fraud, auditors decreased their fraud risk assessments as consistent evidence was presented from a corroborating source. Therefore, auditors increased the efficiency of the audit process by appropriately decreasing their fraud risk assessments after integrating consistent audit evidence from nonfinancial personnel into their judgments. Further, I observed that these auditors revised their fraud risk assessments to a greater extent when audit evidence was provided by a source with a higher level of experience. Though prior research has found auditors to be poor at detecting deception, the results of this study indicate that auditors will increase or decrease their fraud risk assessments and truthfulness judgments based on the consistency of audit evidence gathered from a corroborating source. Therefore, in practice, auditors may be able to detect deception as the audit progresses.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
43

Schafer, G. "Healthcare providers' judgements in chronic pain : the influence of depression, trustworthiness and gender." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1464209/.

Full text
Abstract:
Part one of this volume is a review of the literature on the association between chronic pain and depression. It presents the results of 15 prospective studies, divided into three categories: studies investigating outcomes of chronic pain in patients with depression, studies investigating outcomes of depression in patients with chronic pain, and studies investigating variables associated with chronic pain and depression. The review highlights problems with the measures of depression used in the majority of the studies. The clinical implications are discussed, and suggestions for how future research can overcome methodological limitations are made. Part two presents an empirical study which investigates the influence of history of depression, perceived trustworthiness and gender of the patient; and training level of the clinician on judgements and treatment decisions in patients with chronic pain. The results showed that participants were affected by patient gender and trustworthiness in their pain judgements and management decisions. Implications for reducing bias in training clinicians are discussed. Part three is a critical appraisal of the research process as a whole. It contains some personal reflections on the different stages of research: designing the study, recruiting participants and analysing data. It also reflects further on the research findings.
APA, Harvard, Vancouver, ISO, and other styles
44

Lefevre, Carmen Emilia. "Investigating facial correlates of dominance and trustworthiness : their biological underpinnings and perceptual properties." Thesis, University of St Andrews, 2013. http://hdl.handle.net/10023/3613.

Full text
Abstract:
Information conveyed by the face can be used in social encounters to make fast decisions about another person. Recently, a new model of face perception has been postulated (Oosterhof & Todorov, 2009) suggesting that there are two basic judgements that underlie person evaluations from faces: dominance and trustworthiness. But on the basis of which cues are these judgements made, and do these cues have biological validity? In this thesis I investigate two putative facial cues to dominance and trustworthiness; namely, facial width-to-height ratio (fWHR) and skin yellowness. In men, fWHR has previously been linked to aggressive and dominant behaviour as well as the perception of these traits. Here I show that a more positive dominance related trait (achievement striving) is also related to this metric, indicating a general association of fWHR to dominance rather than simple aggression. Furthermore, I explore the biological underpinnings of this metric by showing 1) that contrary to initial findings and predictions fWHR is not sexually dimorphic, and 2) that fWHR is associated with testosterone, indicating a physiological link between appearance and behaviour. Additionally, I extend current work on fWHR by showing that it acts as a cue to dominance not only in humans but also in non-human primates. The second part of the current thesis firstly identifies skin yellowness as a novel cue used in trustworthiness judgement. It shows that this putatively carotenoid induced cue to current health is not only employed in mate choice context but may also play an important role in other social context and in judgements of who poses an adequate partner for social interactions. Secondly, I show that skin yellowness is inversely related to testosterone levels in men, showing for the first time an association between this carotenoid induced signal and testosterone in humans thereby extending previous work in birds.
APA, Harvard, Vancouver, ISO, and other styles
45

Szekely, Aron. "Do the middle shout loudest? : signs and (counter) signals of trustworthiness and toughness." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:781ca080-e07d-432c-9345-67c207483f2b.

Full text
Abstract:
What do we do when we realise that others with whom we interact already know something about relevant qualities of ours? Do we relying on the information that we naturally emit to get our message across, or do we take actions to try to change the situation in our favour? And, does the information that we emit, generated intentionally or unintentionally, allow us to cooperate with others and conflict to be resolved peacefully? Drawing on signalling and 'countersignalling' theories, and a recent behavioural theory, I explore these questions using two experiments in which the relevant qualities are trustworthiness and toughness, and observational data from the 1997 Survey of Inmates in State and Federal Correctional Facilities concerning violence among prisoners. In the experiments, subjects, who do not know what will follow, initially create a natural indicator of their qualities, and subsequently, have the opportunity to send another indicator, this time fully informed. In one experiment, consistent with countersignalling theory, subjects whose generosity is clear deign to send further information, while those whose generosity can be called under question choose to update their initial action the most. In the other, the toughest subjects put the most effort into getting their message across. Consistent among both, senders' actions correspond to receivers' evaluations. Finally, I find that pertinent information can allow conflicts to be resolved successfully; it is linked with less violence in prison and in a laboratory-based contest.
APA, Harvard, Vancouver, ISO, and other styles
46

Hynd, Dale. "The new spin: Effects of information control behaviours on source trustworthiness and persuasion." Thesis, Hynd, Dale (2007) The new spin: Effects of information control behaviours on source trustworthiness and persuasion. PhD thesis, Murdoch University, 2007. https://researchrepository.murdoch.edu.au/id/eprint/701/.

Full text
Abstract:
Given the high level of skepticism from the public toward politicians, this research explores the communication styles that separate public figures who are trusted and supported from those who are not. Contrary to conventional practice, it is argued that the use of ‘spin’ in political communication is a large factor contributing to the public’s negative perception of politicians. Political spin is defined as a communication style encompassing specific behaviours designed to appeal to the media, control information, and contain the meaning audiences derive from a message. This research operationalised spin as it is used in political communication and compared participants’ responses to messages with low and high levels of spin. The present research comprised three studies. In Study One, interviews were conducted with communication professionals to define the concept and specific ‘information control behaviours’ associated with spin. An ‘authenticity’ scale was then developed to measure audience responses to low and high-spin messages. In Study Two, 50 participants were randomly assigned to view a series of low or high-spin political messages. Participants rated messages from a confederate politician as well as actual politicians, government officials, and corporate representatives using the Authenticity Scale. Study Three was conducted throughout the 5-weeks of political campaigning prior to a general election. A representative sample of 60 voters was used each week in a repeated measures design to rate the political candidates and two confederate politicians using the Authenticity Scale. It was found that participants were able to clearly discern the degree of spin used by politicians when communicating a message. Messages containing a high level of spin elicited more negative attitudes and significantly lower levels of support for politicians, than messages containing a low level of spin. Specifically, participants’ perceptions of source trustworthiness and credibility were significantly higher for politicians using a low-spin style of communication. The findings are discussed in terms of the expectancy disconfirmation theory. The findings suggest that adopting a new low-spin style of communication will assist public figures to communicate more persuasively and to better engage an increasingly skeptical public.
APA, Harvard, Vancouver, ISO, and other styles
47

Hynd, Dale. "The new spin: Effects of information control behaviours on source trustworthiness and persuasion." Hynd, Dale (2007) The new spin: Effects of information control behaviours on source trustworthiness and persuasion. PhD thesis, Murdoch University, 2007. http://researchrepository.murdoch.edu.au/701/.

Full text
Abstract:
Given the high level of skepticism from the public toward politicians, this research explores the communication styles that separate public figures who are trusted and supported from those who are not. Contrary to conventional practice, it is argued that the use of ‘spin’ in political communication is a large factor contributing to the public’s negative perception of politicians. Political spin is defined as a communication style encompassing specific behaviours designed to appeal to the media, control information, and contain the meaning audiences derive from a message. This research operationalised spin as it is used in political communication and compared participants’ responses to messages with low and high levels of spin. The present research comprised three studies. In Study One, interviews were conducted with communication professionals to define the concept and specific ‘information control behaviours’ associated with spin. An ‘authenticity’ scale was then developed to measure audience responses to low and high-spin messages. In Study Two, 50 participants were randomly assigned to view a series of low or high-spin political messages. Participants rated messages from a confederate politician as well as actual politicians, government officials, and corporate representatives using the Authenticity Scale. Study Three was conducted throughout the 5-weeks of political campaigning prior to a general election. A representative sample of 60 voters was used each week in a repeated measures design to rate the political candidates and two confederate politicians using the Authenticity Scale. It was found that participants were able to clearly discern the degree of spin used by politicians when communicating a message. Messages containing a high level of spin elicited more negative attitudes and significantly lower levels of support for politicians, than messages containing a low level of spin. Specifically, participants’ perceptions of source trustworthiness and credibility were significantly higher for politicians using a low-spin style of communication. The findings are discussed in terms of the expectancy disconfirmation theory. The findings suggest that adopting a new low-spin style of communication will assist public figures to communicate more persuasively and to better engage an increasingly skeptical public.
APA, Harvard, Vancouver, ISO, and other styles
48

Strandberg, Dan. "Ensuring Insurance : A study of user expectations on trustworthiness of websites for insurances." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272136.

Full text
Abstract:
The rapidly advancing technology and Internet has opened up for many industries to offer e-commerce solutions. While an increasing amount of industries are offering solutions over the web, the quality of these solutions are increasing both visually and functionally. Simultaneously, users are becoming increasingly accustomed to these increasing standards and it is therefore crucial to keep up with these standards in order to seem trustworthy in the eyes of the customers. The insurance industry is starting to implement ecommerce solutions in this increasingly digital world. However, since the expectations on an insurance company differ from other e-commerce industries, this thesis presents a study on what the people, specifically Digital Natives, expect from an insurance company in terms of trust and reliability. Based on the research findings, the goal of this study was to identify and understand the cause of the users preconceived idea of what trust on an insurance website look like. This was done by reading existing research articles and reports, sending out a survey, conducting user testing with an existing insurance websites followed by an evaluation of designed prototype. The results from the survey and the first user testing identified several factors and characteristics that the users' based the conception of trust towards an insurance company on. These factors and characteristics were further tested and verified in a designed prototype and the findings were discussed. Lastly, specific factors of trust for insurance companies were highlighted and a conclusion was made.
Den snabbt avancerande tekniken och Internet har öppnat upp för många branscher att erbjuda e- handelslösningar. Under tiden som fler industrier erbjuder lösningar på nätet ökar kvaliteten på dessa lösningar, både visuellt och funktionellt. Samtidigt blir användarna mer och mer vana vid dessa ökande standarder och det är därför viktigt att hänga med dessa ökande standarder för att uppfattas som pålitliga i kundernas ögon. Försäkringsbranschen börjar implementera e-handelslösningar i denna alltmer digitala värld. Eftersom förväntningarna på ett försäkringsbolag skiljer sig från andra e-handelsbranscher presenterar denna rapport en studie av vad människor, framförallt Digital Natives, förväntar sig av ett försäkringsbolag när det gäller förtroende och tillförlitlighet. Baserat på resultatet av forskningen var målet med denna studie att identifiera och förstå orsaken till användarnas förutfattade mening om hur försärkingshemsidor inger förtroende. Detta gjordes genom att läsa befintliga forskningsartiklar och rapporter, insamling av svar från en enkät, användartester med befintliga försäkringsbolags hemsidor följt av användartester med en designad prototyp. Resultaten från undersökningen och den första iterationen av användartester identifierade flera faktorer och egenskaper som användarnas baserade förtroendet för ett försäkringsbolag på. Dessa faktorer och egenskaper testades och verifierades vidare i den designade prototypen varvid dessa fynd diskuterades. Slutligen lyftes specifika förtroendefaktorer för försäkringsbolag fram och en slutsats gjordes.
APA, Harvard, Vancouver, ISO, and other styles
49

Jenkins, James G. Jr. "The Influence of a Client Preference on Auditor Judgment: An Investigation of Temporal Effects and Client Trustworthiness." Diss., Virginia Tech, 1998. http://hdl.handle.net/10919/30465.

Full text
Abstract:
The purpose of this dissertation is to investigate auditors' judgments and decisions in the presence of an explicitly stated client preference. This investigation considers two factors. First, the temporal placement (i.e., timing) of the client preference is varied to allow for an examination of differential effects associated with the receipt of an early client preference and a late client preference. Second, client trustworthiness is varied so that participants may have a basis upon which to evaluate the client's representations (i.e., preferences). Practicing auditors, who were either managers or senior managers at a national accounting firm, participated in the study by completing two audit tasks in which the two factors were manipulated. Findings indicate that explicitly stated client preferences resulted in significantly different decision processes, but did not significantly influence auditors' judgment processes. However, further analysis indicated that there was no significant client preference (CP) effect observed for auditors' final decisions. Therefore, it appears that the influence of the client's preference was transitory. Taken together, these findings suggest that the CP did not result in a loss of auditors' objectivity. Auditors' judgments and decisions were sensitive to the client's relative trustworthiness. This finding suggests that auditors are responsive to a client's credibility when evaluating the client's representations. This result is expected given since generally accepted auditing standards require auditors to consider a source's credibility. However, it is surprising that auditors' evidence evaluation efforts were not differentially sensitive to the client's trustworthiness. Such a finding may indicate that the participating auditors' evidence evaluation efforts are more influenced by firm policy than individual judgment.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
50

Bodireddigari, Sai Srinivas. "A Framework To Measure the Trustworthiness of the User Feedback in Mobile Application Stores." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13481.

Full text
Abstract:
Context: Mobile application stores like Google Play, Apple store, Windows store have over 3 million apps. Users download the applications from their respective stores and they generally prefer the apps with the highest ratings. In response to the present situation, application stores provided the categories like editor’s choice or top charts, providing better visibility for the applications. Customer reviews play such critical role in the development of the application and the organization, in such case there might be flawed reviews or biased opinions about the application due to many factors. The biased opinions and flawed reviews are likely to cause user review untrustworthiness. The reviews or ratings in the mobile application stores are used by the organizations to make the applications more efficient and more adaptable to the user. The context leads to importance of the user’s review trustworthiness and managing the trustworthiness in the user feedback by knowing the causes of mistrust. Hence, there is a need for a framework to understand the trustworthiness in the user given feedback. Objectives: In the following study the author aims for the accomplishment of the following objectives, firstly, exploring the causes of untrustworthiness in user feedback for an application in the mobile application stores such as google play store. Secondly, Exploring the effects of trustworthiness on the users and developers. Finally, the aim is to propose a framework for managing the trustworthiness in the feedback. Methods: To accomplish the objectives, author used qualitative research method. The data collection method is an interview-based survey that was conducted with 13 participants, to find out the causes of untrustworthiness in the user feedback from user’s perspective and developer’s perspective. Author follows thematic coding for qualitative data analysis. Results:Author identifies 11 codes from the description of the transcripts and explores the relationship among the trustworthiness with the causes. 11 codes were put into 4 themes, and a thematic network is created between the themes. The relations were then analyzed with cost-effect analysis. Conclusions: We conclude that 11 causes effect the trustworthiness according to user’s perspective and 9 causes effect the trustworthiness according to the developer’s perspective, from the analysis. Segregating the trustworthy feedback from the untrustworthy feedback is important for the developers, as the next releases should be planned based on that. Finally, an inclusion and exclusion criteria to help developers manage trustworthy user feedback is defined.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography