Journal articles on the topic 'Trustworthy service management'

To see the other types of publications on this topic, follow the link: Trustworthy service management.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trustworthy service management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Luo, Zongwei, and Tianle Zhang. "A Mobile Service Platform for Trustworthy E-Learning Service Provisioning." International Journal of Dependable and Trustworthy Information Systems 1, no. 3 (July 2010): 1–13. http://dx.doi.org/10.4018/jdtis.2010070101.

Full text
Abstract:
Distant e-learning emerges as one of promising means for people to learn online. Although there is a substantial increase in computer and network performance in recent years, mainly as a result of faster hardware and more sophisticated software, there are still problems in the fields of integrating various resources towards enabling distant e-learning. Further, with the advances of technologies in RFID, sensors, GPS, GPRS, IP networks, and wireless networks, mobile learning is becoming a viable means for teaching and learning. In this book chapter, we develop a service platform for mobile learning with trustworthy service provisioning based on an organic integration of our prior research results in service grid, on demand e-learning, and trusted mobile asset tracking. In this platform, the virtual learning services for students, instructors and course providers are provided leveraging on service grid resource management capabilities on group collaboration, ubiquitous data access, and computing power. Challenges and requirements for mobile learning service platform are discussed. An RFID based e-learning data integration is proposed with integrated service networks for intelligent e-learning information access and delivery.
APA, Harvard, Vancouver, ISO, and other styles
2

Farahbakhsh, Bahareh, Ali Fanian, and Mohammad Hossein Manshaei. "TGSM: Towards trustworthy group-based service management for social IoT." Internet of Things 13 (March 2021): 100312. http://dx.doi.org/10.1016/j.iot.2020.100312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kurdi, Heba, Bushra Alshayban, Lina Altoaimy, and Shada Alsalamah. "TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/1073216.

Full text
Abstract:
Cloud computing plays a major role in smart cities development by facilitating the delivery of various services in an efficient and effective manner. In a Peer-to-Peer (P2P) federated clouds ecosystem, multiple Cloud Service Providers (CSPs) collaborate and share services among them when experiencing a shortage in certain resources. Hence, incoming service requests to this specific resource can be delegated to other members. Nevertheless, the lack of preexisting trust relationship among CSPs in this distributed environment can affect the quality of service (QoS). Therefore, a trust management system is required to assist trustworthy peers in seeking reliable communication partners. We address this challenge by proposing TrustyFeer, a trust management system that allows peers to evaluate the trustworthiness of other peers based on subjective logic opinions, formulated using peers’ reputations and Service Level Agreements (SLAs). To demonstrate the utility of TrustyFeer, we evaluate the performance of our method against two long-standing trust management systems. The simulation results show that TrustyFeer is more robust in decreasing the percentage of services that do not conform to SLAs and increasing the success rate of exchanged services by good CSPs conforming to SLAs. This should provide a trustworthy federated clouds ecosystem for a better, more sustainable future.
APA, Harvard, Vancouver, ISO, and other styles
4

Perepelkin, Jason, and David Di Zhang. "Quality alone is not enough to be trustworthy." International Journal of Pharmaceutical and Healthcare Marketing 8, no. 2 (May 27, 2014): 226–42. http://dx.doi.org/10.1108/ijphm-02-2013-0006.

Full text
Abstract:
Purpose – The aim of this paper is to argue that quality alone is not enough; pharmacies need to develop a rapport with their customers and convey sincerity. Community (retail) pharmacy is an increasingly competitive industry. Service quality has been considered one of the key factors for pharmacies to differentiate and develop competitive advantage. The customers’ perception of the sincerity of the pharmacies mediates the relationship between quality and trust. Design/methodology/approach – Through consumer intercept, we collected survey data from 150 customers in a western Canadian city who had filled a prescription at the pharmacy in the previous six months. Data were analyzed using structure equation modeling. Findings – Our data revealed that while overall service quality has a positive influence on customer trust, perception of sincerity has a more immediate impact. The relationship between quality and trust was completely mediated through sincerity perception. Originality/value – Service quality has been introduced to pharmacy management and produced many good results. However, the measurement of service quality has historically emphasized on physical evidence. The element of human interaction and subjective affective perceptions has been largely ignored because it is difficult to measure, hence difficult to reward and implement. Our study highlights the importance of personal interactions in the context of pharmacy quality management.
APA, Harvard, Vancouver, ISO, and other styles
5

Moustafa, Ahmed, Minjie Zhang, and Quan Bai. "Trustworthy Stigmergic Service Compositionand Adaptation in Decentralized Environments." IEEE Transactions on Services Computing 9, no. 2 (March 2016): 317–29. http://dx.doi.org/10.1109/tsc.2014.2298873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhatia, Sugandh, and Jyoteesh Malhotra. "CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3756. http://dx.doi.org/10.11591/ijece.v8i5.pp3756-3766.

Full text
Abstract:
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
APA, Harvard, Vancouver, ISO, and other styles
7

HWANG, JUNSEOK, SO YOUNG KIM, HAK-JIN KIM, and JIHYOUN PARK. "AN OPTIMAL TRUST MANAGEMENT METHOD TO PROTECT PRIVACY AND STRENGTHEN OBJECTIVITY IN UTILITY COMPUTING SERVICES." International Journal of Information Technology & Decision Making 10, no. 02 (March 2011): 287–308. http://dx.doi.org/10.1142/s0219622011004336.

Full text
Abstract:
Utility computing services constitute business opportunities in the customer-to-customer (C2C) marketplace. Providers deal with the risks and uncertainties faced by users while transacting with unfamiliar counterparts. Ensuring trustworthy transactions among unfamiliar users is an important condition of utility-computing service. Many peer-to-peer (P2P) sites utilize reputation systems; however, such systems are subject to lack of reviewer objectivity and robustness against attacks as well as unfair ratings. In this study, we propose the manual adjustment of reputation ratings by means of transaction monitoring and establish that the resulting enhanced objectivity and robustness in utility-computing service transactions will strengthen the trust management system. We also propose the optimal level of monitoring and penalizing activities based on the level of privacy concerns among users and the appropriate complementary service.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullah, Lamya, and Juan Quintero. "Sealed computation: a mechanism to support privacy-aware trustworthy cloud service." Information & Computer Security 27, no. 5 (November 11, 2019): 601–20. http://dx.doi.org/10.1108/ics-11-2018-0133.

Full text
Abstract:
Purpose The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. Design/methodology/approach An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. Findings Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained. Originality/value A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).
APA, Harvard, Vancouver, ISO, and other styles
9

Robles, Tomás, Borja Bordel, Ramón Alcarria, and Diego Sánchez-de-Rivera. "Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091211. http://dx.doi.org/10.1177/1550147720912110.

Full text
Abstract:
Users are each day more aware of their privacy and data protection. Although this problem is transversal to every digital service, it is especially relevant when critical and personal information is managed, as in eHealth and well-being services. During the last years, many different innovative services in this area have been proposed. However, data management challenges are still in need of a solution. In general, data are directly sent to services but no trustworthy instruments to recover these data or remove them from services are available. In this scheme, services become the users’ data owners although users keep the rights to access, modify, and be forgotten. Nevertheless, the adequate implementation of these rights is not guaranteed, as services use the received data with commercial purposes. In order to address and solve this situation, we propose a new trustworthy personal data protection mechanism for well-being services, based on privacy-by-design technologies. This new mechanism is based on Blockchain networks and indirection functions and tokens. Blockchain networks execute transparent smart contracts, where users’ rights are codified, and store the users’ personal data which are never sent or given to external services. Besides, permissions and privacy restrictions designed by users to be applied to their data and services consuming them are also implemented in these smart contracts. Finally, an experimental validation is also described to evaluate the Quality of Experience (in terms of user satisfaction) and Quality of Service (in terms of processing delay) compared to traditional service provision solutions.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam, Masoom, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung, and Quratulain Alam. "Behavioral Attestation for Web Services Based Business Processes." International Journal of Web Services Research 7, no. 3 (July 2010): 52–72. http://dx.doi.org/10.4018/jwsr.2010070103.

Full text
Abstract:
Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.
APA, Harvard, Vancouver, ISO, and other styles
11

Winter, A. "The Future of Medical Informatics." Methods of Information in Medicine 48, no. 01 (2009): 62–65. http://dx.doi.org/10.3414/me9138.

Full text
Abstract:
Summary Objectives: Presenting the author’s point of view on chances and challenges of medical informatics in research, education, and practice of information management, especially in the field of regional as well as institutional health information systems. Method: Collecting and interpreting current issues concerning (health) information systems and their management from selected references. Results: There are challenging research topics concerning information management, IT service management in small health care units, reference models, trustworthy architectures, service-oriented architectures. Medical informatics requires multidisciplinarity. Conclusions: Medicine and health care need medical informatics as a scientific, researching discipline.
APA, Harvard, Vancouver, ISO, and other styles
12

Sultana, Mehbooba, Ditalak Mpanme, and Jaynal Uddin Ahmed. "Customer Relationship Management Practices and Employee Sensitivities of Private Sector Banks: An Analysis in Indian Context." Business and Economic Research 12, no. 4 (December 13, 2022): 68. http://dx.doi.org/10.5296/ber.v12i4.20426.

Full text
Abstract:
This paper aims to scrutinize bank employees' perspectives on customer relationship management (CRM) practices in the banking sector, particularly private sector commercial banks operating in Goalpara District of Assam, India. The research plan consists of experimental in nature whereby different aspects of CRM in the banking sector have been extracted from the previous literature and tested on a sample size 24 number of employees working in the banks selected taking 3 each from 8 branches. Based on Bank Service Quality (BSQ) scale, variables were selected and analysed with the help of descriptive statistics and ranking analysis of identified parameters was utilized with the help of the Garret ranking technique. The study found that the loan facility and ATM facility along with service variety are found as the major product-related factors; timely services with trustworthy behaviour of the employees and the quality of services along with procedural simplicity and convenience is the most important service-related factors for evolving an effective CRM practice. The employee perceptions on the personal relationship of the bank officials with their customers’ staples in selecting the banks and retaining the customers.
APA, Harvard, Vancouver, ISO, and other styles
13

Anisetti, Marco, Claudio Agostino Ardagna, Ernesto Damiani, and Filippo Gaudenzi. "A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification." IEEE Transactions on Services Computing 13, no. 1 (January 1, 2020): 30–43. http://dx.doi.org/10.1109/tsc.2017.2657505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (April 8, 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Full text
Abstract:
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms. Design/methodology/approach – Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models. Findings – A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms. Originality/value – The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Jian Hong, Xue Liu, and Cheng Lian Liu. "A RSA-Based Data Integrity Check without Original Data in the Cloud Computing." Applied Mechanics and Materials 44-47 (December 2010): 3726–30. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3726.

Full text
Abstract:
At present, Cloud computing is becoming a hot topic in the field of research and applications. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. However,this unique paradigm brings about many new security challenges, which have not been well understood. As such, it has become crucial for an archive service to be capable of providing evidence to demonstrate the integrity of data stored in it. This work studies the problem of ensuring the integrity of data storage in Cloud Computing.
APA, Harvard, Vancouver, ISO, and other styles
16

Emmy Dwi Setyaningsih. "SHARIA MANAGEMENT AND BENEFITS FOR FOOD TRADERS." Al-Idarah : Jurnal Manajemen dan Bisnis Islam 3, no. 1 (February 20, 2022): 82–88. http://dx.doi.org/10.35316/idarah.2022.v3i1.82-88.

Full text
Abstract:
The development and competition of the business world in the current era of globalization is getting higher. This study aims to determine the marketing strategy of basic food traders. The method used is qualitative based on observation, interviews, and documentation. The results showed, (a). The marketing strategy of this basic food business has implemented a sharia marketing strategy that is honest, trustworthy, and communicative. (b). business development strategy of basic food sellers in improving the welfare of the community by providing affordable and competitive prices, as well as providing maximum service to consumers, establishing harmonious relationships with internal and external parties of the company, and trying hard and earnestly.Keywords: Management Strategy, Basic Food Business, Islamic Economy.
APA, Harvard, Vancouver, ISO, and other styles
17

Wexler, Mark N., and Judy Oberlander. "Robo-advisors (RAs): the programmed self-service market for professional advice." Journal of Service Theory and Practice 31, no. 3 (January 8, 2021): 351–65. http://dx.doi.org/10.1108/jstp-07-2020-0153.

Full text
Abstract:
PurposeThis conceptual paper draws together an interdisciplinary approach to robo-advisors (RAs) as an example of an early and successful example of automated, programmed professional services.Design/methodology/approachLittle is known about the forces driving this change in the delivery of professional service. This work explores the drivers of RAs, the degree of disruption incurred by the introduction of RAs, and how, as RAs advance, trust in algorithmic authority aids in legitimating RAs as smart information.FindingsFrom the firms' perspective, the drivers include rebranding occasioned by the financial crisis (2008), the widening of the client base and the “on-trend” nature of algorithmic authority guided by artificial intelligence (AI) embedded in RAs. This examination of the drivers of RAs indicates that professional service automation is aligned with information society trends and is likely to expand.Practical implicationsExamining RAs as an indicator of the future introduction of programmed professional services suggests that success increases when the algorithmic authority in the programmed serves are minimally disruptive, trustworthy and expand the client base while keeping the knowledge domain of the profession under control of the industry.Originality/valueTreating RAs as an early instance of successfully embedding knowledge in AI and algorithmically based platforms adds to the early stages of theory and practice in the monetization and automation of professional knowledge-based services.
APA, Harvard, Vancouver, ISO, and other styles
18

Groth Andersson, Signe, and Verner Denvall. "Data Recording in Performance Management." American Journal of Evaluation 38, no. 2 (December 16, 2016): 190–204. http://dx.doi.org/10.1177/1098214016681510.

Full text
Abstract:
In recent years, performance management (PM) has become a buzzword in public sector organizations. Well-functioning PM systems rely on valid performance data, but critics point out that conflicting rationale or logic among professional staff in recording information can undermine the quality of the data. Based on a case study of social service staff members, the authors explore three recording logics. The findings reveal a complexity of recording behavior and show how frontline staff shift between recording logics according to the situation. The actual data recordings depend not only on the overall logic but also on factors such as attitudes, assumptions, and motives. The authors suggest that shifting recording logics weaken the validity of performance data. These shifts undermine the idea of PM as a trustworthy strategy to bridge the gap between professional and managerial staff, as well as the possibility of a well-informed management.
APA, Harvard, Vancouver, ISO, and other styles
19

Sylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief, and Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things." Security and Communication Networks 2021 (April 14, 2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.

Full text
Abstract:
IoT technologies facilitate the development and the improvement of pervasive computing by enabling effective context-awareness features. These features enable the IoT applications to detect the user’s situation and adapt their behavior. They also enable context-aware security and privacy, which consist in adapting security and privacy mechanisms’ deployment to the user’s situation. Research studies on context-aware security and privacy focus on security and privacy mechanisms’ implementation but do not consider the secure and trustworthy context management. In this paper, we introduce a new secure and trustworthy context management system for context-aware security and privacy in the smart city: “SETUCOM.” SETUCOM is the implementation of the DTM (Device Trust Management) module of the CASPaaS (Context-Aware Security and Privacy as a Service) architecture. It secures context information exchange by using a lightweight hybrid encryption system adapted to IoT devices and manages trust through artificial intelligence techniques such as Bayesian networks and fuzzy logic. A detailed description of the proposed system is provided, and its main performances are evaluated. The results prove SETUCOM feasibility in context-aware security and privacy for the smart city.
APA, Harvard, Vancouver, ISO, and other styles
20

Berry, Leonard L., Tracey S. Danaher, Lerzan Aksoy, and Timothy L. Keiningham. "Service Safety in the Pandemic Age." Journal of Service Research 23, no. 4 (July 29, 2020): 391–95. http://dx.doi.org/10.1177/1094670520944608.

Full text
Abstract:
The service sector has been rocked by the COVID-19 pandemic. This stems in large part from the inseparable, high-contact nature of many services. During a pandemic, multiple forms of contact – customer-to-customer, customer-to-employee, employee-to-employee, and customer/employee-to-air/surfaces – can lead to serious illness or death. The urgent need for increased separability and decreased contact have led to a wave of service adaptations (firms’ efforts to improve safety) and service transformations (innovations that bolster safety while offering additional benefits that are superior to what existed previously). COVID-19 has made service safety paramount, with most attention being paid to minimizing disease transmission. However, safety needs in a pandemic extend beyond physical to include interrelated domains of emotional, financial, and information safety. Physical safety is the absence of harm or injury. Emotional safety is relief from mental distress arising from pandemic-related personal traumas. Financial safety concerns minimizing economic insecurity related to the pandemic. Information safety refers to people’s sense of confidence that they have the information they need to make good decisions, information that is trustworthy. We describe the unique service transformations addressing these safety concerns of Hong Kong International Airport, Henry Ford Health System (Detroit), Innocent Bystander (Australia), and Service Now that are likely to continue after the pandemic has passed. Important questions for service researchers to guide managers in reinventing how they create, deliver, and market services are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
21

Brown, Antony, Paul Sant, Nik Bessis, Tim French, and Carsten Maple. "Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures." International Journal of Systems and Service-Oriented Engineering 1, no. 4 (October 2010): 1–18. http://dx.doi.org/10.4018/jssoe.2010100101.

Full text
Abstract:
Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.
APA, Harvard, Vancouver, ISO, and other styles
22

Hendra, Hendra, Ravel Ravel, Novel Firdhaus, Michael Ari Kurniawan, and Gilbert Platina. "E-HEALTH PERSONAL DATA PROTECTION IN INDONESIA." JURNAL HUKUM KESEHATAN INDONESIA 1, no. 02 (April 13, 2022): 121–31. http://dx.doi.org/10.53337/jhki.v1i02.15.

Full text
Abstract:
Since Covid-19 day by day users additional attentive to their privacy and information protection. though this drawback is transverse to each digital service, it's particularly relevant once important and private info is managed, as in eHealth and well-being services. throughout the last years, many alternative innovative services during this space are projected. However, information management challenges area unit still in would like of an answer. In general, information area unit directly sent to services however no trustworthy instruments to recover this information or take away them from services area unit obtainable. In these paper author needs to debate privacy aspects of non-public information within the eHealth program and the way Indonesia regulate Privacy and protection of patient’s personal information in Indonesia. the strategy used is normative juridical approach with descriptive analytical specifications. the method of knowledge assortment is finished through literature.
APA, Harvard, Vancouver, ISO, and other styles
23

L'Hours, Hervé, Mari Kleemola, and Lisa De Leeuw. "CoreTrustSeal: From academic collaboration to sustainable services." IASSIST Quarterly 43, no. 1 (May 10, 2019): 1–17. http://dx.doi.org/10.29173/iq936.

Full text
Abstract:
National and international digital repositories must design and deliver sustainable services as a foundation for a range of scientific and data management infrastructures while reducing costs and avoiding duplication of effort. The CoreTrustSeal, launched in 2017, defines requirements and offers core level certification for Trustworthy Digital Repositories (TDR) holding data for long-term preservation. This paper traces the journey of the CoreTrustSeal through the Data Seal of Approval (DSA), ICSU World Data System (WDS), Research Data Alliance (RDA) working groups, and community engagement, towards becoming a sustainable service supporting global data infrastructure. We outline the design and delivery of the service, current activities, the benefits of certification to a range of communities, and future plans and challenges. As well as providing a historical narrative and current and future perspectives the CoreTrustSeal experience offers lessons for those developing standards and best practices, or seeking to develop cooperative and community-driven efforts which bridge data curation across academic disciplines and the governmental and private sectors.
APA, Harvard, Vancouver, ISO, and other styles
24

Saadoon, Karzan J., Mustafa Muhlis, and Rezhan O. Mohammed. "Architecture Students’ Satisfaction in Iraqi Private Universities: TIU-S in Focus." International Journal of Sustainable Development and Planning 17, no. 4 (July 27, 2022): 1349–54. http://dx.doi.org/10.18280/ijsdp.170432.

Full text
Abstract:
The importance of service quality is undeniable. For years, numerous marketing professionals have researched its direct and indirect impacts on customer satisfaction and loyalty. Academics have proposed empathy, responsiveness, assurance, reliability, and tangibles as the primary drivers of service quality, university-related physical items or resources (technologic apparatus, smartboards, air conditioners, garden facilities, sports facilities, computer laboratories, etc.). The capacity of a service provider to offer essential service or acceptable and trustworthy responses to a student's demands or questions is referred to as reliability. This research aimed to benchmark the service quality dimensions of the architectural engineering department compared to other departments at Tishk International University-Sulaimani, Iraq. A quantitative research method has been applied. To do this, we have used ServQual and asked those questions to more than 100 students from architectural engineering, civil engineering, and business management departments. The data were analysed, and the results were initially analysed through regression analysis, and the obtained standardised weights of the regression analysis have been used for benchmarking after being normalised. The results show that the architectural engineering department delivered the best service quality compared to civil engineering and the business management department.
APA, Harvard, Vancouver, ISO, and other styles
25

Mujawar, Tabassum N., and Lokesh B. Bhajantri. "The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijcac.308273.

Full text
Abstract:
Cloud computing delivers various resources and services to users over internet. At present many businesses and individual users are adopting cloud services to avail benefits such as, less time, less cost, less management, and maintenance. Still, security is the primary issue that must be tackled and one of the security issues is access control mechanism. The most widely used access control method includes Ciphertext Policy Attribute based Encryption, which is encrypted access control scheme. In order to ensure trustworthy and encrypted access control, a trusted hierarchical access structure based encryption scheme is proposed in this paper. The proposed scheme uses hierarchical access structure to encrypt multiple messages and avoid generation of multiple ciphertexts. The trust evaluation component is also integrated with the proposed access control mechanism. An efficient method to assign trust level for service providers and data users by utilizing their behavioral parameters is proposed in the paper.
APA, Harvard, Vancouver, ISO, and other styles
26

Grott, Emily Mary, Jesus Cambra-Fierro, Lourdes Perez, and Mirella Yani-de-Soriano. "How cross-culture affects the outcomes of co-creation." European Business Review 31, no. 4 (June 10, 2019): 544–66. http://dx.doi.org/10.1108/ebr-01-2018-0022.

Full text
Abstract:
Purpose The aim of this study is two-fold. Firstly, to examine the outcomes of co-creation from a customer perspective using well-recognised customer management variables (customer satisfaction, loyalty and word-of-mouth (WOM). Secondly, to assess potential cross-cultural differences that may exist within the context of co-creation. Design/methodology/approach A questionnaire was completed in the banking services industry, and the final valid sample comprised individuals from the UK and Spain. Multi-sample analysis was carried out using PLS software. Findings Co-creation has a direct influence on customer satisfaction, customer loyalty and WOM; co-creation activities lead to cumulative customer satisfaction, which also affects customer loyalty and positive WOM. Furthermore, the results show that the direct relationships between co-creation and loyalty and WOM are more powerful for British consumers than Spanish consumers, who need to feel satisfied prior to demonstrating loyalty and engaging in positive WOM. Practical implications Firms can use co-creation as a strategic tool if they provide trustworthy collaboration spaces. Furthermore, firms need to adapt the way they interact, listen and respond to customers in different cultural contexts. Trustworthy collaboration spaces and adapting to cultural differences can result in customers who are more satisfied, loyal to the company and more likely to carry out positive WOM, which can ultimately lead to future business. Originality/value This study provides insights into co-creation from a customer perspective. Although much service research has examined the drivers of customer co-creation, literature that analyses the consequences of customer co-creation is still scarce. Moreover, this is the first study to provide empirical evidence of cross-cultural differences within the context of co-creation.
APA, Harvard, Vancouver, ISO, and other styles
27

Rana, Kajol, Ajay Vikram Singh, and P. Vijaya. "Intelligent Trust based Security Framework for Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 2s (December 31, 2022): 14–22. http://dx.doi.org/10.17762/ijritcc.v10i2s.5907.

Full text
Abstract:
Trust models have recently been proposed for Internet of Things (IoT) applications as a significant system of protection against external threats. This approach to IoT risk management is viable, trustworthy, and secure. At present, the trust security mechanism for immersion applications has not been specified for IoT systems. Several unfamiliar participants or machines share their resources through distributed systems to carry out a job or provide a service. One can have access to tools, network routes, connections, power processing, and storage space. This puts users of the IoT at much greater risk of, for example, anonymity, data leakage, and other safety violations. Trust measurement for new nodes has become crucial for unknown peer threats to be mitigated. Trust must be evaluated in the application sense using acceptable metrics based on the functional properties of nodes. The multifaceted confidence parameterization cannot be clarified explicitly by current stable models. In most current models, loss of confidence is inadequately modeled. Esteem ratings are frequently mis-weighted when previous confidence is taken into account, increasing the impact of harmful recommendations. In this manuscript, a systematic method called Relationship History along with cumulative trust value (Distributed confidence management scheme model) has been proposed to evaluate interactive peers trust worthiness in a specific context. It includes estimating confidence decline, gathering & weighing trust parameters and calculating the cumulative trust value between nodes. Trust standards can rely on practical contextual resources, determining if a service provider is trustworthy or not and does it deliver effective service? The simulation results suggest that the proposed model outperforms other similar models in terms of security, routing and efficiency and further assesses its performance based on derived utility and trust precision, convergence, and longevity.
APA, Harvard, Vancouver, ISO, and other styles
28

Dai, Huan, Pengzhan Shi, He Huang, Ruyu Chen, and Jun Zhao. "Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/3050953.

Full text
Abstract:
The emerging smart city is driving massive transformations of modern cities, facing the huge influx of sensor data from IoT devices. Edge computing distributes computing tasks to the near-edge end, which greatly enhances the service quality of IoT applications, that is, ultralow latency, large capacity, and high throughput. However, due to the constrained resource of IoT devices, currently, systems with a centralized model are vulnerable to attacks, such as DDoS from IoT botnet and central database failure, which can hardly provide high-confidence services. Recently, blockchain with a high security promise is considered to provide new approaches to enhancing the security of IoT systems. However, blockchain and IoT have obvious incompatibility, and low-capacity IoT devices can hardly be incorporated into blockchain with high computing requirements. In this paper, a blockchain-edge computing hybrid system (BEHS) is presented to make the adaptation of blockchain to edge computing and provide trustworthy IoT management services for a smart city. A novel extensible consensus protocol designed for proof-of-work, named proof-of-contribution (PoC), is proposed to regulate the data upload behaviors of nodes, especially the data upload frequency of IoT device nodes, so as to protect the system from attack about frequency. In order to secure the data privacy and authenticity, a data access control scheme is designed by integrating symmetric encryption with asymmetric encryption algorithm. We implemented a concrete BEHS on Ethereum, realized the function of PoC mechanism via smart contracts, and conducted a case study for smart city. The extensive evaluations and analyses show that the proposed PoC mechanism can effectively detect and automatically manage the behavior of nodes, and the time cost of data access control scheme is within an acceptable range.
APA, Harvard, Vancouver, ISO, and other styles
29

Blobel, B. G. M. E. "Educational Challenge of Health Information Systems’ Interoperability." Methods of Information in Medicine 46, no. 01 (2007): 52–56. http://dx.doi.org/10.1055/s-0038-1628132.

Full text
Abstract:
Summary Objectives: As health care develops from an organization-centered via service-centered (disease management) towards a person-centered system (favored homecare, patient monitoring, body area networks), information systems involved have to be semantically interoperable, process-related, decision-supportive, context-sensitive, user-oriented, and trustworthy. Methods: The aforementioned paradigm shift requires highly flexible solutions based on knowledge concepts, provided by a service-oriented and model-driven approach. Results: Information systems’ design, implementation and maintenance have to be realized based on formal grammar. This is true for all considered aspects and views of the system and its components, using metalanguages and reflecting all domains touched. Conclusions: For meeting the challenge, involvement of, and close collaboration between, experts from different domains as well as knowledge and tooling regarding formal modeling and model interchange are required.
APA, Harvard, Vancouver, ISO, and other styles
30

Kang, Yunhee, Jaehyuk Cho, and Young B. Park. "An Empirical Study of a Trustworthy Cloud Common Data Model Using Decentralized Identifiers." Applied Sciences 11, no. 19 (September 27, 2021): 8984. http://dx.doi.org/10.3390/app11198984.

Full text
Abstract:
The Conventional Cloud Common Data Model (CDM) uses a centralized method of user identification and credentials. This needs to be solved in a decentralized way because there are limitations in interoperability such as closed identity management and identity leakage. In this paper, we propose a DID (Decentralized Identifier)-based cloud CDM that allows researchers to securely store medical research information by authenticating their identity and to access the CDM reliably. The proposed service model is used to provide the credential of the researcher in the process of creating and accessing CDM data in the designed secure cloud. This model is designed on a DID-based user-centric identification system to support the research of enrolled researchers in a cloud CDM environment involving multiple hospitals and laboratories. The prototype of the designed model is an extension of the encrypted CDM delivery method using DID and provides an identification system by limiting the use cases of CDM data by researchers registered in cloud CDM. Prototypes built for agent-based proof of concept (PoC) are leveraged to enhance security for researcher use of ophthalmic CDM data. For this, the CDM ID schema and ID definition are described by issuing IDs of CDM providers and CDM agents, limiting the IDs of researchers who are CDM users. The proposed method is to provide a framework for integrated and efficient data access control policy management. It provides strong security and ensures both the integrity and availability of CDM data.
APA, Harvard, Vancouver, ISO, and other styles
31

Alonso, Juncal, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya, and Iñaki Etxaniz. "Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum." Information 12, no. 8 (July 30, 2021): 308. http://dx.doi.org/10.3390/info12080308.

Full text
Abstract:
The current IT market is more and more dominated by the “cloud continuum”. In the “traditional” cloud, computing resources are typically homogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are widely diverse, commonly with scarce capacities and must be managed very efficiently due to battery constraints or other limitations. A combination of resources and services at the edge (edge computing), in the core (cloud computing), and along the data path (fog computing) is needed through a trusted cloud continuum. This requires novel solutions for the creation, optimization, management, and automatic operation of such infrastructure through new approaches such as infrastructure as code (IaC). In this paper, we analyze how artificial intelligence (AI)-based techniques and tools can enhance the operation of complex applications to support the broad and multi-stage heterogeneity of the infrastructural layer in the “computing continuum” through the enhancement of IaC optimization, IaC self-learning, and IaC self-healing. To this extent, the presented work proposes a set of tools, methods, and techniques for applications’ operators to seamlessly select, combine, configure, and adapt computation resources all along the data path and support the complete service lifecycle covering: (1) optimized distributed application deployment over heterogeneous computing resources; (2) monitoring of execution platforms in real time including continuous control and trust of the infrastructural services; (3) application deployment and adaptation while optimizing the execution; and (4) application self-recovery to avoid compromising situations that may lead to an unexpected failure.
APA, Harvard, Vancouver, ISO, and other styles
32

Bamakan, Seyed Mojtaba Hosseini, Najmeh Faregh, and Ahad ZareRavasan. "Di-ANFIS: an integrated blockchain–IoT–big data-enabled framework for evaluating service supply chain performance." Journal of Computational Design and Engineering 8, no. 2 (February 17, 2021): 676–90. http://dx.doi.org/10.1093/jcde/qwab007.

Full text
Abstract:
Abstract Service supply chain management is a complex process because of its intangibility, high diversity of services, trustless settings, and uncertain conditions. However, the traditional evaluating models mostly consider the historical performance data and fail to predict and diagnose the problems’ root. This paper proposes a distributed, trustworthy, tamper-proof, and learning framework for evaluating service supply chain performance based on blockchain and adaptive network-based fuzzy inference systems (ANFIS) techniques, named Di-ANFIS. The main objectives of this research are as follows: (1) presenting hierarchical criteria of service supply chain performance to cope with the diagnosis of the problems’ root; (2) proposing a smart learning model to deal with the uncertainty conditions by a combination of neural network and fuzzy logic; and (3) introducing a distributed blockchain-based framework due to the dependence of ANFIS on big data and the lack of trust and security in the supply chain. Furthermore, the proposed six-layer conceptual framework consists of the data layer, connection layer, blockchain layer, smart layer, ANFIS layer, and application layer. This architecture creates a performance management system using the Internet of Things, smart contracts, and ANFIS based on the blockchain platform. The Di-ANFIS model provides a performance evaluation system without needing a third party and a reliable intermediary that provides an agile and diagnostic model in a smart and learning process. It also saves computing time and speeds up information flow.
APA, Harvard, Vancouver, ISO, and other styles
33

Alshaabani, Ayman, Khadija Aya Hamza, and Ildikó Rudnák. "Impact of Diversity Management on Employees’ Engagement: The Role of Organizational Trust and Job Insecurity." Sustainability 14, no. 1 (December 31, 2021): 420. http://dx.doi.org/10.3390/su14010420.

Full text
Abstract:
The frequent world changes raised by globalization, new technology development, and the increase in migration movements have generated an immensely diversified workforce. To face these challenges, managers started to seek the best strategies to effectively run this mixed environment and implement the leading diversity management policies for human resource management sustainability, which is also considered as very constructive in boosting employees’ performance, motivation, satisfaction, as well as their work engagement. Consistently, this paper examines the impact of service companies’ diversity management systems on employees’ engagement and the moderating role of organizational trust and job insecurity in that relationship. As we opted for a quantitative study, we managed a survey based on a questionnaire dedicated to 580 employees working in Hungarian companies, specializing in Marketing, Management consulting, IT, and logistics services, to effectively assess the hypothesis concluded from the literature review. With the use of structural equation modeling (SEM) as a data analysis tool, our findings reveal that diversity management has a positive significant effect on Employees’ engagement and that organizational trust and job insecurity truly and significantly mediate that association. Along with social exchange theory, our research contributes to affirming that by implementing proper diversity management practices and by ensuring a trustworthy environment and outstanding work conditions, managers are constructively able to assist their employees, raise their involvement, and minimize the level of job insecurities.
APA, Harvard, Vancouver, ISO, and other styles
34

Arseni, Ștefan-Ciprian, Bogdan-Cosmin Chifor, Mihai Coca, Mirabela Medvei, Ion Bica, and Ioana Matei. "RESFIT: A Reputation and Security Monitoring Platform for IoT Applications." Electronics 10, no. 15 (July 31, 2021): 1840. http://dx.doi.org/10.3390/electronics10151840.

Full text
Abstract:
The fast-paced adoption of smart devices has changed the Internet of Things (IoT) landscape, leading to the growth of smart environments and inclusion in many aspects of our society. In IoT applications, data collected from sensors and mobile devices are aggregated, processed, and analyzed to extract useful information and develop intelligent services. If the collected data is not trustworthy due to the damage or malicious input of some sensors, the quality of the service will be impacted. For reliable data collection and mining, it is mandatory to define robust security and trust models, suitable for the IoT application context. In this paper, we propose RESFIT, a platform that implements a reputation-based trust mechanism and an advanced application level firewall to cope with the above mentioned issues. Having a gateway-centric architecture, the proposed platform ensures minimal resource consumption at the node layer, and an integrated overview and control of the system state, through the cloud component and smartphone management application.
APA, Harvard, Vancouver, ISO, and other styles
35

Maulida, Eva Fahmadia Jilan, and Ahmad Muhtadi Anshor. "Strategi Lembaga Amil Zakat Infak Shadaqah Muhammadiyah Kabupaten Tulungagung Dalam Meningkatkan Kepercayaan Muzakki." ZAWA: Management of Zakat and Waqf Journal 2, no. 1 (June 30, 2022): 1. http://dx.doi.org/10.31958/zawa.v2i1.6368.

Full text
Abstract:
Zakat is the leading financial instrument among Muslims. Therefore, muzakki's trust in the Amil Zakat Institution must be encouraged to increase groups. Furthermore, this study aims to determine the LAZISMU strategy in Tulungagung Regency to increase muzakki confidence and determine the supporting and obstacles factors in increasing muzakki trust. This study used field research with a qualitative approach descriptively to get the information concerning an existing condition. As a zakat management institution, LAZISMU Tulungagung Regency uses various strategies to increase the trust of muzakki, including Distribution of trustworthy zakat infaq and shadaqah funds, transparency of fund management, improving service quality, and maintaining relationships with muzakki. This strategy aims to increase muzakki trust carried out by LAZISMU Tulungagung Regency. In addition, in 2021, around 90% of the Tulungagung Regency Muhammadiyah Association members will receive ZIS funds through LAZISMU Tulungagung Regency.
APA, Harvard, Vancouver, ISO, and other styles
36

Rasouli, Mohammad R., Rik Eshuis, Paul W. P. J. Grefen, Jos J. M. Trienekens, and Rob J. Kusters. "Information Governance in Dynamic Networked Business Process Management." International Journal of Cooperative Information Systems 25, no. 04 (December 2016): 1740004. http://dx.doi.org/10.1142/s0218843017400044.

Full text
Abstract:
Competition in today’s globalized markets forces organizations to collaborate within dynamic business networks to provide mass-customized integrated solutions for customers. The collaboration within dynamic business networks necessitates forming dynamic networked business processes (DNBPs). Networked business processes need to be supported by high quality information that is exchanged in a trustworthy environment. Information governance (IG) is described as a holistic approach to different mechanisms that support high quality and secure information exchanges. However, dynamism of networked business processes causes IG issues like unsecured information access and low quality information products to emerge. In this paper, a comprehensive list of the IG issues in DNBPs is identified through structured steps. The identified IG issues are characterized within four main categories, respectively, information product quality, information service quality, information security, and metadata issues. For the evaluation of the practical significance of the identified IG issues, a case study is conducted in a business network that provides mobility solutions. In this way, the paper closes the gap between studies on IG, which have mostly concentrated on IG within the borders of a single organization or IG in stable business networks, and studies on dynamic business networks, which have addressed the formation of dynamic inter-organizational interactions without paying rigorous attention to information artefacts that are exchanged.
APA, Harvard, Vancouver, ISO, and other styles
37

Singh, Vaishali, Amit Jain, and Sapna Choraria. "Exploring the Role of Complaint Handling among Complaining Consumers." Vision: The Journal of Business Perspective 20, no. 4 (December 2016): 331–44. http://dx.doi.org/10.1177/0972262916668739.

Full text
Abstract:
Differentiating organization through service quality and engaging customer for long-term profit motive is a strategic adaptation for the complex competitive retail platform in India. Such approach incorporates the value of trust to ensure desired customer retention. The procedure further intensifies when an organizational approach emphasize effective complaint handling system within its service protocol. Based on this established relationship, this study explores the viability of the framework in the presence of customer complain intention categories with Indian context. Data for this descriptive study are collected using a structured questionnaire from 450 respondents. Out of the three types of complainants (consumer complaint intention), voice complaint intention appeared as the strongest determinant of consumer trust and retention as compared to private and third party complaint intention. On providing complaint handling, the strength of the relationship improved to the greatest extent for private complaint intention while there was no effect of complaint handling for voice complaint intention. Results of the study highlight as to what extent complaint handling matters for different types of complainants (voice, private and third party). Such practices can help the retailers distinguish and accordingly handle various types of complainants. Effective complaint handling practices can make the complainants more trustworthy and loyal than before.
APA, Harvard, Vancouver, ISO, and other styles
38

Subhadra, Akella. "An Analysis of Data Security and Privacy for Cloud Computing." Asian Journal of Computer Science and Technology 9, no. 1 (May 5, 2020): 27–39. http://dx.doi.org/10.51983/ajcst-2020.9.1.2153.

Full text
Abstract:
Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and how cloud provides data integrity, confidentiality, availability over user’s data? How data stored over cloud storage servers will be protected from attackers? Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.
APA, Harvard, Vancouver, ISO, and other styles
39

Chang, Hangbae, and Gwangmin Park. "A study on medical information leakage protection to construct a trustworthy medical service oriented architecture in IoT environment: case study of medical tour service in South Korea." International Journal of Services Technology and Management 25, no. 3/4 (2019): 215. http://dx.doi.org/10.1504/ijstm.2019.100046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chang, Hangbae, and Gwangmin Park. "A study on medical information leakage protection to construct a trustworthy medical service oriented architecture in IoT environment: case study of medical tour service in South Korea." International Journal of Services Technology and Management 25, no. 3/4 (2019): 215. http://dx.doi.org/10.1504/ijstm.2019.10021596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Saleem, Mahreen, M. R. Warsi, Saiful Islam, Areesha Anjum, and Nadia Siddiquii. "Trust Management in the World of Cloud Computing. Past Trends and Some New Directions." Scalable Computing: Practice and Experience 22, no. 4 (December 12, 2021): 425–44. http://dx.doi.org/10.12694/scpe.v22i4.1952.

Full text
Abstract:
Over the past years, Cloud computing has become one of the most influential information technologies to combat computing needs because of its unprecedented advantages. In spite of all the social and economic benefits it provides, it has its own fair share of issues. These include privacy, security, virtualization, storage, and trust. The underlying issues of privacy, security, and trust are the major barriers to the adoption of cloud by individuals and organizations as a whole. Trust has been the least looked into since it includes both subjective and objective characteristics. There is a lack of review on trust models in this research domain. This paper focuses on getting insight into the nomenclature of trust, its classifications, trust dimensions and throws an insight into various trust models that exist in the current knowledge stack. Also, various trust evaluation measures are highlighted in this work. We also draw a comparative analysis of various trust evaluation models and metrics to better understand the notion of trust in cloud environments. Furthermore, this work brings into light some of the gaps and areas that need to be tackled toward solving the trust issues in cloud environments so as to provide a trustworthy cloud ecosystem. Lastly, we proposed a Machine Learning backed Rich model based solution for trust verification in Cloud Computing. We proposed an approach for verifying whether the right software is running for the correct services in a trusted manner by analyzing features generated from the output cloud processed data. The proposed scheme can be utilized for verifying the cloud trust in delivering services as expected that can be perceived as an initiative towards trust evaluation in cloud services employing Machine learning techniques. The experimental results prove that the proposed method verifies the service utilized with an accuracy of 99%.
APA, Harvard, Vancouver, ISO, and other styles
42

Ren, Wei, and Xiaochen Wu. "Application of Intelligent Medical Equipment Management System Based on Internet of Things Technology." Journal of Healthcare Engineering 2022 (February 23, 2022): 1–12. http://dx.doi.org/10.1155/2022/9149996.

Full text
Abstract:
The management level of medical equipment is an important index to evaluate the modernization degree of hospitals and it is also the basic element of medical and scientific research work, which plays a key role in the development of medical clinical science. Under the background of the rapid development of modern Internet of Things (IoT) technology, hospitals should be fully aware of the role of Internet of Things technology in hospital medical equipment management. With the increasing demand for refined management of medical equipment in hospitals, the application potential of the Internet of Things technology in medical equipment management has gradually become prominent. The management of medical equipment in a hospital is an important part of the management of the hospital, which is related to the medical level, service quality, and economic benefits of the hospital. In this paper, we have analyzed current problems in the management of medical equipment in hospitals, discussed the application of the Internet of Things technology in the management of medical equipment, and promoted the management of medical equipment to be more intelligent and automated. Experimental results have verified that the proposed scheme could be one of the trustworthy automated systems, preferably technology assisted, for the proper management of the medical equipment particularly in hospitals.
APA, Harvard, Vancouver, ISO, and other styles
43

Van, Nguyen Thi Thanh, Vasiliki Vrana, Nguyen Thien Duy, Doan Xuan Huy Minh, Pham Tien Dzung, Subhra R. Mondal, and Subhankar Das. "The Role of Human–Machine Interactive Devices for Post-COVID-19 Innovative Sustainable Tourism in Ho Chi Minh City, Vietnam." Sustainability 12, no. 22 (November 16, 2020): 9523. http://dx.doi.org/10.3390/su12229523.

Full text
Abstract:
In this research article, we aim to study the proposed role of human–machine interactive (HMI) technologies, including both artificial intelligence (AI) and virtual reality (VR)-enabled applications, for the post-COVID-19 revival of the already depleted tourism industry in Vietnam’s major tourist destination and business hub of Ho Chi Minh City. The researchers aim to gather practical knowledge regarding tourists’ intentions for such service enhancements, which may drive the sector to adopt a better conclusive growth pattern in post-COVID-19 times. In this study, we attempt to focus on travelers who look for paramount safety with the assurance of empathetic, personalized care in post-COVID-19 times. In the current study, the authors employ structural equation modeling to evaluate the intentions of tourists both structurally and empirically for destination tourism with data collected from tourists with previous exposure to various kinds of these devices. The study shows that human–machine interactive devices are integrating AI and VR and have a significant effect on overall service quality, leading to tourist satisfaction and loyalty. The use of such social interactive gadgets within tourism and mostly in hospitality services requires an organization to make a commitment to futuristic technologies, along with building value by enriching service quality expectations among fearful tourists. This research shows that tourists mainly focus on the use of such HMI devices from the perspective of technology acceptance factors, qualitative value-enhancing service and trustworthy information-sharing mechanisms. The concept of the tour bubble framework is also discussed in detail. The analysis of this discussion gives us a more profound understanding of the novel opportunities which various administrative agencies may benefit from to position these devices better in smart, sustainable destination tourism strategies for the future so that, collectively, service 5.0 with HMI devices can possibly bring back tourism from being disintegrated. Such service applications are the new social innovations leading to sustainable service and a sophisticated experience for all tourists.
APA, Harvard, Vancouver, ISO, and other styles
44

Arya, Mukesh Kumar, and Namit Gupta. "Adoptive Cloud Application in Semantic Web." International Journal of Advance Research and Innovation 2, no. 2 (2014): 48–51. http://dx.doi.org/10.51976/ijari.221407.

Full text
Abstract:
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
APA, Harvard, Vancouver, ISO, and other styles
45

Nanda Herijal Putra. "Administrasi Publik Dalam Perspektif Islam: Kajian Pada Sistem Pemerintahan Umar Bin Khattab." Politica: Jurnal Hukum Tata Negara dan Politik Islam 8, no. 2 (December 1, 2021): 17–24. http://dx.doi.org/10.32505/politica.v8i2.3541.

Full text
Abstract:
This study examines about public administration in an Islamic perspective, studies on the system of government of Umar Bin Khattab. The administrative system was not implemented before Nabi Muhammad SAW moved to Medina, after Nabi Muhammad SAW moved from Mecca to Medina, reading and writing activities began to be carried out among the Muslims and to build a government based on Islamic law. The development of the administration was increasingly rapid during the Caliphate of Umar bin Khattab. This research is a type of library research with a research approach using qualitative research methods. Literature research is research that uses data collection techniques by reviewing books, literature, notes and various reports related to the problem to be studied. Public administration as a discipline that is dynamic in accordance with the times. In line with the times, public administration has changed for the better in accordance with the demands of an increasingly complex era. In the western perspective, public administration has experienced developments starting from the old public administration paradigm, new public management, to the new public service. In an Islamic perspective, administration is known as al-idara. Administration in Islam refers to the Qur'an and its interpretations as well as hadiths and syarahs. The sources of interpretation provide an explanation of the signs of the Qur'an whose position exceeds the general rules relating to the order of people's lives. In the context of public services, excellent service is a must and obligation for both the government and the state civil apparatus. Public services are carried out based on Islamic teachings, namely the services provided must be good, honest, quality and trustworthy.
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.

Full text
Abstract:
Cloud computing has been a hot researching area of computer network technology, since it was proposed in 2007. Cloud computing also has been envisioned as the next-generation architecture of IT Enterprise [1]. Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. It moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy [2]. This poses many new security challenges. In this paper, we just focus on data storage security in the cloud, which has been the most important aspect of quality of service. To ensure the confidentiality and integrity of user’s data in the cloud, and support of data dynamic operations, such as modification, insertion and deletion, we propose a framework for storage security, which includes cryptographic storage scheme and data structure. With our framework, the untrusted server cannot learn anything about the plaintext, and the dynamic operation can be finished in short time. The encryption algorithm and data storage structure is simple, and it’s easy to maintain. Hence, our framework is practical to use today.
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Zhen, Tzuhui Wu, Fenghong Wang, Mohamed Osmani, and Peter Demian. "Blockchain Enhanced Construction Waste Information Management: A Conceptual Framework." Sustainability 14, no. 19 (September 26, 2022): 12145. http://dx.doi.org/10.3390/su141912145.

Full text
Abstract:
Despite the large quantities of secondary materials flowing within the built environment, their actual volume and respective waste management processes are not accurately known and recorded. Consequently, various sustainability and material efficiency policies are not supported by accurate data and information-reporting associated with secondary materials’ availability and sourcing. Many recent studies have shown that the integration of digital technologies such as city information management (CIM), building information modeling (BIM), and blockchain have the potential to enhance construction waste management (CWM) by classifying recycled materials and creating value from waste. However, there is insufficient guidance to address the challenges during the process of CWM. Therefore, the research reported in this paper aims to develop a blockchain-enhanced construction waste information management conceptual framework (BeCW). This paper is the first attempt to apply the strengths of integrated information-management modeling with blockchain to optimize the process of CWM, which includes a WasteChain for providing a unified and trustworthy credit system for evaluating construction-waste-recyclability to stakeholders. This is enabled through the use of blockchain and self-executing smart contracts to clarify the responsibility and ownership of the relevant stakeholders. As a result, this study provides a unified and explicit framework for referencing which quantifies the value-contribution of stakeholders to waste-recovery and the optimization of secondary construction materials for reuse and recycling. It also addresses the issue of sustainable CWM through information exchange at four levels: user, application, service, and infrastructure data levels.
APA, Harvard, Vancouver, ISO, and other styles
48

Musyafaah, Nur Lailatul, and Arif Wijaya. "Pelayanan Publik Pada Dinas Kependudukan dan Pencatatan Sipil di Kabupaten Lamongan Dalam Perspektif Fikih Siyasah." Al-Daulah: Jurnal Hukum dan Perundangan Islam 10, no. 2 (October 4, 2020): 251–74. http://dx.doi.org/10.15642/ad.2020.10.2.251-274.

Full text
Abstract:
This article discusses public services at the Population and Civil Registration Service (Dispendukcapil) Lamongan according to Fiqh Siyasah. This research is field research and is qualitative in nature. Data were collected through observation, interviews, and documentation. The collected data were analyzed by the deductive method. The result of the research shows that public services in the Dispendukcapil Lamongan are related to administrative services, which include population services (KTP, KK, Transfer Certificate) and civil registration services (birth certificates, death certificates, marriage certificates, divorce certificates, child validation certificates). Even though the Dispendukcapil Lamongan has made efforts to improve services, there are still complaints from the public in several services, both from service attitudes and facilities, including in the queuing system and waiting room facilities. In the fiqh siyasah perspective, the public services provided by the Dispendukcapil Lamongan are part of the fiqh siyasah idariyyah (administrative management fiqh). In serving the people, a state employee must be trustworthy, honest, and fair. The service must be based on benefit as the rule of tasharruf al-imam ala al-raiyyah manut bi al mashlahah (Public service must be based on maslahat). Based on this, it is hoped that the Dispendukcapil Lamongan will further improve the quality of services, facilities, and infrastructure. Abstrak: Artikel ini membahas tentang Pelayanan Publik pada Dinas Kependudukan dan Pencatatan Sipil (Dispendukcapil) Lamongan menurut Fikih Siyasah. Penelitian ini adalah Penelitian lapangan dan bersifat kualitatif. Data dikumpulkan melalui observasi, wawancara dan dokumentasi. Data yang terkumpul dianalisis dengan metode deduktif. Hasil penelitian adalah pelayanan publik di Dispendukcapil Lamongan adalah berkaitan dengan pelayanan administrasi yaitu meliputi pelayanan kependudukan (KTP, KK, Surat Keterangan Pindah) dan pelayanan pencatatan sipil (Akta Kelahiran, Akta Kematian, Akta Perkawinan, Akta Perceraian, Akta pengesahan anak). Meskipun Dispendukcapil Kabupaten Lamongan telah berusaha meningkatkan pelayanan, masih terdapat keluhan masyarakat dalam beberapa pelayanan baik dari sikap pelayanan maupun fasilitas, di antaranya dalam sistem antrian dan fasilitas ruang tunggu. Dalam perspektif fikih siyasah, pelayanan publik yang diberikan Dispendukcapil Kabupaten Lamongan merupakan bagian dari fikih siyasah idariyyah (fikih pengelolaan administrasi). Dalam melayani rakyat, seorang pegawai negara harus amanah, jujur dan adil. Pelayanan tersebut harus didasarkan pada kemaslahatan sebagaimana kaidah tasharruf al-imam ala al-raiyyah manut bi al mashlahah (Pelayanan publik harus didasarkan pada maslahat). Berdasarkan hal tersebut, diharapkan DIspendukcapil Lamongan semakin meningkatkan kualitas pelayanan, sarana dan prasarana.
APA, Harvard, Vancouver, ISO, and other styles
49

Olsen, Christine S., and Bruce A. Shindler. "Trust, acceptance, and citizen - agency interactions after large fires: influences on planning processes." International Journal of Wildland Fire 19, no. 1 (2010): 137. http://dx.doi.org/10.1071/wf08168.

Full text
Abstract:
Wildfires have increased in number and size in recent years, making post-fire forest management an increasingly important topic. Citizen–agency interactions, citizen trust, and citizen acceptance of management strategies are central to successful planning and decision-making in these settings. In this study, citizen opinions from the attentive public are evaluated in two locations near recent fires in Oregon: the 2003 Bear and Booth Complex Fires and the 2002 Biscuit Fire. Results suggest an agency’s commitment to long-term interactions with citizens influences citizen trust in the agencies and acceptance of post-fire management strategies. There is broad acceptance for several post-fire management strategies (i.e. erosion control, replanting, reseeding). However, acceptance is highly dependent on trustworthy relations. Further, results suggest it is not enough to simply offer opportunities for public engagement; citizens need to feel that these activities were meaningful opportunities to participate. Although results differed between locations, overall the majority of respondents did not agree with how the local Forest Service and Bureau of Land Management handled forest planning after recent fires. Findings from this research indicate that positive citizen–agency relations need to be long-term and developed well before a fire occurs if post-fire actions are to be supported by communities.
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Daniel, Robert Cronin, Jamie Robinson, Shilo Anders, Kim Unertl, Katherine Kelly, Heather Hankins, Ryan Skeens, and Gretchen Jackson. "Common Consumer Health-Related Needs in the Pediatric Hospital Setting: Lessons from an Engagement Consultation Service." Applied Clinical Informatics 09, no. 03 (July 2018): 595–603. http://dx.doi.org/10.1055/s-0038-1667205.

Full text
Abstract:
Background Informed and engaged parents may influence outcomes for childhood illness. Understanding the needs of the caregivers of pediatric patients is a critical first step in promoting engagement in their child's care. In 2014, we developed an Engagement Consultation Service at the Monroe Carell Jr. Children's Hospital at Vanderbilt. This service determines the health-related needs of the caregivers of hospitalized children and makes educational or technology recommendations to meet those needs and support engagement. Objectives This report describes the most common health-related needs identified in the caregivers of hospitalized pediatric patients and details the recommended interventions to meet those needs. Methods The most commonly reported consumer health-related needs from our 3-year experience with the Engagement Consultation Service were extracted from consultations notes. Each need was classified by semantic type using a taxonomy of consumer health needs. Typical recommendations for each need and their administration were detailed. Results The most frequently recognized needs involved communicating with health care providers after discharge, using medical devices, distinguishing between benign and concerning symptoms, knowing what questions to ask providers and remembering them, finding trustworthy sources of information online, understanding disease prognosis, and getting emotional support. A variety of apps, Web sites, printed materials, and online groups were recommended. Conclusion The parents of hospitalized patients share several common health-related needs that can be addressed with educational and technology interventions. An inpatient Engagement Consultation Service provides a generalizable framework for identifying health-related needs and delivers tools to meet those needs and promote engagement during and after hospitalizations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography