Teses / dissertações sobre o tema "Les confiances"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Les confiances".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Gallant, Martine. "Le type de garde parentale et la structure des visites suite au divorce et leurs effets sur les confiances générale et relationnelle des enfants à l'âge adulte". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ37846.pdf.
Texto completo da fonteMoreau, Pierre-Etienne. "Programmation et confiance". Habilitation à diriger des recherches, Institut National Polytechnique de Lorraine - INPL, 2008. http://tel.archives-ouvertes.fr/tel-00337408.
Texto completo da fonteCette approche, permettant de combiner différents formalismes est étudiée d'un point de vue formel.
Dans un deuxième temps, je me suis intéressé à la confiance que les programmeurs peuvent avoir dans les programmes qu'ils écrivent et dans les outils qu'ils utilisent.
Ces travaux m'ont amené à proposer des constructions de haut niveau (filtrage équationnel, anti-termes et stratégies) ainsi qu'à formaliser leur sémantique.
Nous présentons également une méthode originale qui permet certifier que le code produit par le compilateur Tom préserve bien la sémantique de ces constructions.
Kuty, Franklin. "L'impartialité du juge répressif: de la confiance décrétée à la confiance justifiée". Doctoral thesis, Universite Libre de Bruxelles, 2004. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211136.
Texto completo da fonteLe législateur a entendu que la confiance soit à la base de l’impartialité du juge. Les travaux préparatoires du Code d'instruction criminelle de 1808 et du Code de procédure civile de 1806 l’illustrent. Au début du dix-neuvième siècle, l’impression qui se dégage au premier coup d’œil est plus celle d’une confiance décrétée en l’impartialité que d’une confiance justifiée. Il existait en quelque sorte un mythe du juge irréprochable. Cette impression se déduit de la circonstance que le sentiment de confiance est posé en principe malgré l’efficacité limitée des garanties juridiques de l’impartialité qui sont offertes à cette époque. Il en va de même, par analogie, de l’impartialité qui apparaît tout autant décrétée.
L’institution de l’impartialité du juge répressif présentait ainsi un sérieux paradoxe. Il apparaissait normal que la confiance attendue de la nation dans ses juges et leur impartialité soit justifiée par de sérieuses garanties. Or, en 1808, la légitimité du juge reposait essentiellement sur un sentiment de confiance décrétée, de sorte qu’il pouvait s’en déduire que la justice n’avait pour seule légitimité que la volonté du pouvoir qu’il en soit ainsi.
Dès les années quatre-vingts, les justiciables se montrèrent de plus en plus critiques envers les représentants du Pouvoir judiciaire, au point que nombreux furent ceux qui réclamèrent la restauration et la justification de la confiance dans l’impartialité du juge. C’est ainsi que des garanties objectives, concrètes, vérifiables, s’avérèrent requises. La restauration de la confiance en l’impartialité nous paraît dépendre, pour une bonne part, du renforcement des règles de procédure et d’organisation judiciaire qui contribuent à l’impartialité du juge.
La thèse s’articule en trois parties. La première s’attache à l’étude des garanties de l’exigence d’impartialité personnelle ou subjective du juge répressif. Nous envisageons, outre la définition de la notion d’impartialité personnelle (titre I), les garanties de nature procédurale qui renvoient à la notion de confiance légitimée (titre II) et les garanties instituées en cas de doute quant à l’impartialité personnelle du juge qui correspondent à la notion de confiance préservée (titre III). La seconde partie concerne les garanties de l’exigence d’impartialité fonctionnelle ou organique. Après avoir défini ce que recouvre cette notion (titre I), nous entendons définir la théorie de la séparation des fonctions de justice répressive, qui renvoie à la notion de confiance impossible (titre II). Nous clôturerons cette seconde partie par l’étude du principe du cumul d’interventions à l’occasion de l’exercice d’une même fonction de justice répressive, qui exprime un sentiment de confiance intact dans l’impartialité du juge (titre III). La troisième partie est consacrée à l’étude de trois questions de portée générale relatives à l’exigence d’impartialité :la renonciation au droit à un tribunal impartial qui dénote un sentiment de confiance indiscutable (titre I), la recevabilité du moyen qui soulève le défaut d’impartialité dans le chef du juge une fois la décision prononcée, qui renvoie à la notion de confiance protégée (titre II), et la sanction du défaut d’impartialité enfin, qui évoque la notion de confiance restaurée (titre III).
Doctorat en droit
info:eu-repo/semantics/nonPublished
Lepelletier, Patrice. "Sur les régions de confiance : amélioration, estimation d'un degré de confiance conditionnel". Rouen, 2004. http://www.theses.fr/2004ROUES017.
Texto completo da fonteWe consider confidence sets for a location parameter in the framework of spherically symmetric distributions. For usual confidence sets, two topics are tackled: their domination by confidence sets centered at the positive part James-Stein estimator and the estimation of their confidence statement. We establish a robustness result showing that this domination is guaranteed, in presence of a residual vector, for any spherically symmetric distribution. Next we consider the problem of estimating the confidence statement of the usual confidence set of the mean of a p-variate normal distribution with identity covariance matrix. We formally establish the domination over the usual estimator 1 - α, the confidence coefficient, of a competitive estimator 1 - α + s. We extend this result to the spherically symmetric distributions including the previous problem in the problem of estimating a general function of a quadratic function. This domination relies on a partial differential inequality involving the Laplacian DELTAs through a Green formula. Finally we establish an appropriate version of a Green formula needed in the estimation problem of a general function of a quadratic function
Askari, Muniza. "Risques, confiance et l'éducation". Paris 1, 2010. http://www.theses.fr/2010PA010043.
Texto completo da fonteChaulet, Johann. "La confiance médiatisée : la confiance et sa gestion au sein des communications médiatisées". Toulouse 2, 2007. https://hal.archives-ouvertes.fr/tel-01252308.
Texto completo da fonteThis thesis is about the usages of mediated communication devices. Its aim is to understand how their generalization renews the way people “equip” and deal with their trust relationships. This interest for the notion of trust leads us to place the questions of information, availability, commitment and surveillance in the center of our analysis. Due to the pertinence of this broadening the study of “close relationships” has been complemented by relations centered around a specific goal (via the study of internet connecting websites) and contractual relationships in very equipped work places (in call centers). The diversity of these situations allows us to examine the confrontation of the two main concepts of mediation and trust. It seems that, if these mediations don't change the main grounds of trust, they do modify some aspects of relations to others and the uncertainty they imply. Our findings document the hypothesis of growing rationalization of communication and relational practices based, mainly, on new information that those always more numerous mediations produce
Dementhon, Agathe. "De la confiance aux représentations sociales : un nouvel éclairage théorique du concept de confiance : le cas de la confiance dans l'achat industriel". Paris 10, 2001. http://www.theses.fr/2001PA100013.
Texto completo da fonteReilles, Antoine Kirchner Claude. "Réécriture et compilation de confiance". S. l. : S. n, 2006. http://www.scd.inpl-nancy.fr/theses/2006_REILLES_A.pdf.
Texto completo da fonteCrocquesel, Cyril. "Contrôle supervisé, confiance et dialogue". Télécom Bretagne, 2012. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=12920.
Texto completo da fonteTrust in automation is an essential characteristic of supervised control. Indeed, counter performance of man-machine duo caused by poor trust level (overtrust or undertrust) can lead to material or human damage. It is therefore necessary to assess the trust of the man to anticipate such situations and prevent their realization. Therefore, in this thesis, we propose an evaluation model of trust. For this, we defined two models. The first is a model of dialogue based on the theory of grounding and specific for supervised control. The second is an evaluation model of trust which describes the relationship between user trust and observation of his strategy dialogue obtained trough the first model. The theoretical contribution is accompanied by two experiments. They are contextualized in the field of multi-UAV control and more specifically for patrol and interception missions. The first experiment, with exploratory purposes, highlights the existence of a link between trust and dialogue. The second checks our evaluation model of trust. This thesis therefore provides the basis for an objective assessment of trust with the observation of man-machine dialogue
Reilles, Antoine. "Réécriture et compilation de confiance". Thesis, Vandoeuvre-les-Nancy, INPL, 2006. http://www.theses.fr/2006INPL084N/document.
Texto completo da fonteMost computer processes involve the notion of transformation, in particular the compilation processes. We interest in this thesis in providing tools and methods, based on rewriting, giving the opportunity to increase the confidence we can place into those processes. We develop first a framework used to validate the compilation of matching constructs, building a formal proof of the validity of the compilation process along with a witness of this proof, for each run of the compiler. Then, in order to allow one to write safely complex transformations, we propose a tool that generates an efficient data structure integrating algebraic invariants, as well as a strategy language that enables to control the application of transformations. Those results can be seen as a first step towards the constitution of generic and safe methods for the development of trustworthy transformations
Reilles, Antoine. "Réécriture et compilation de confiance". Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2006. http://www.theses.fr/2006INPL084N.
Texto completo da fonteMost computer processes involve the notion of transformation, in particular the compilation processes. We interest in this thesis in providing tools and methods, based on rewriting, giving the opportunity to increase the confidence we can place into those processes. We develop first a framework used to validate the compilation of matching constructs, building a formal proof of the validity of the compilation process along with a witness of this proof, for each run of the compiler. Then, in order to allow one to write safely complex transformations, we propose a tool that generates an efficient data structure integrating algebraic invariants, as well as a strategy language that enables to control the application of transformations. Those results can be seen as a first step towards the constitution of generic and safe methods for the development of trustworthy transformations
Visconti, Jean-François. "Risque moral, confiance et culture : validité et déterminants socio-démographiques du construit de confiance générale". Paris, ENSAM, 2004. http://www.theses.fr/2004ENAM0044.
Texto completo da fonteWe present two empirical studies about the cultural determinants of the general trust attitude and its influence on consumer behavior. A survey conducted between 1999 and 2003 on a sample of 103 persons shows the validity of two general trust scales (General Trust and Turst in People) and their abiblity to evaluate an individual's propension to buy on the internet. The data from the World Value Survey (1990-1993), wich includes the Trust in People scale, show that nationality has a stronger influence on trust then socio-demographic variables (sex, age, eduction level, income, size of town, marital status and religion). We also find that trust is strongly correlated with the cultural dimensions of individualism, power distance, uncertainty avoidance and masculinity (trust is higher in scandinavian and english-speaking countries than in continental Europe and South America). Finally, we show that trust levels are strongly correlated with an index of electronic commerce development. We conclude that general trust is a cultural variable and that this partly explains with electronic commerce grows at a difference speed in different countries
Lamoureux, Marie-Ève. "Confiance interethnique : le cas de l’Afrique". Mémoire, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9563.
Texto completo da fonteEdel, Vincent. "La confiance en droit des contrats". Montpellier 1, 2006. http://www.theses.fr/2006MONT1023.
Texto completo da fonteVance, Anthony Osborn. "Faire confiance aux artefacts technologiques : Analyse de l'influence de la confiance sur l'utilisation des technologies de l'information". Paris 9, 2008. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2008PA090067.
Texto completo da fonteBenamour, Yasmine. "Confiance interpersonnelle et confiance institutionnelle dans la relation client-entreprise de service : une application au secteur bancaire français". Paris 9, 2000. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2000PA090029.
Texto completo da fonteMoulias, Sophie. "Ethique, personne de confiance et maladie d'Alzheimer". Phd thesis, Université René Descartes - Paris V, 2012. http://tel.archives-ouvertes.fr/tel-00745279.
Texto completo da fonteBussard, Laurent. "Protocoles d'établissement de confiance pour objets communicants". Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000879.
Texto completo da fonteJean-Baptiste, Teddy. "Confiance du consommateur, consommation, et activité économique". Antilles-Guyane, 2002. http://www.theses.fr/2002AGUY0088.
Texto completo da fonteBussard, Laurent. "Protocoles d'établissement de confiance pour objets communicants /". Paris : École nationale supérieure des télécommunications, 2005. http://catalogue.bnf.fr/ark:/12148/cb399450397.
Texto completo da fonteVu, Van-Hoan. "Infrastructure de gestion de la confiance sur internet". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611839.
Texto completo da fonteNomine, Jean-Christophe. "Les commerçants de marché : des entrepreneurs de confiance". Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO20082/document.
Texto completo da fonteUrban market sellers have been quite unknown by sociology. However, a long history has structured through centuries their uses and their culture. Beyond this legacy, urban markets managed to change their main function, while keeping their original one.This research is seeking a double aim. First of all it intends to depict an accurate description of urban market and its sellers. Then we can find out how a group that has to deal with global unstability manages to build and rule a territory. Second, the point is to understand why such a micro-local kind of merchant deals succeeds in still standing in a world that is more and more globalizing. Trust seems to be the key to catch it. Urban markets do aggregate the various ways of trust, hence they are still standing and produce social ties
Bienfait, Eric. "Abus de biens sociaux et abus de confiance". Nice, 2003. http://www.theses.fr/2003NICE0012.
Texto completo da fonteSince the new penal code of 1994, misappropriation funds and breach of trust find one's way in a common repressive sphere of operations. These violations lead to a difficulty of differentiation and a confusion risk, which don't go with legal security principles and criminal legality. Indeed, risk materialize through the opportunity of a dual qualification suggested to judges. The doctrine, in its majority, is favourable to a reform in this context. Some of the authors aim at precise aspect of misappropriation funds as the prescription delay. Others consider that a content reform is necessary. Therefore, simple deletion of misappropriation funds violation would not be contemplate as a solution. Then, it's advisable to determinate in what extent breach of trust will supplant misappropriation funds. In this way, it is also necessary to find improvement for this incrimination in order to cover completely the repressive sphere of operations
Masmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels". Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Texto completo da fonteWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Shahroozi, Vahid. "Direction, construction de la confiance et changement organisationnel". Bordeaux 4, 2010. http://www.theses.fr/2010BOR40031.
Texto completo da fonteThe path to globalization is strewn with potential problems that can break down organizational trust among leaders and followers. Changes in organizational structure, size, work arrangements and/or complexity require effective leadership who is responsible for managing followers in diverse situations. Designing, evaluating and implementing successful change strategies largely depend upon how leaders facilitate the change process and reduce the uncertainly associated with the change situation, and then encourage positive action of followers in the change process, and reduce their opposition. Organizations and their managers must recognize that change, in itself, is not necessarily a problem. The problem often lies in an inability to develop high trust relations, and manage change effectively. In this study, using other scholar’s research findings, the overlap between leadership theories, trust building research, cultural studies (in organizational level), and social network theories is explored. By focusing on managerial behaviour, this study has examined transformational leadership behaviors in Auto Part Manufacturing Sector in IRAN. It was going to test the effect of transformational leadership behaviors on followers trust in their leader with helps of network of people in an organization. It is first investigated that which kind of transformational leadership behaviour has more impact on follower’s trust in the leader. And second, it is determined that which group of people in organizational network facilitate development of such trusting stances. Both qualitative and quantitative methods were used to explore what the role of a leader is in promoting change through trust building. In this respect, a questionnaire was designated to measure effect of both different transformational leadership behaviors and organizational network on follower’s trust in their leader. It was assumed that the answers would be based on followers’ knowledge of their workplace and their existing relationship with the leader. Interestingly, with helps of the company owners and directors, 3-5 group sessions were arranged in each company during which all respondents were got together and answered the questionnaires simultaneously. Respondents of different organizational culture, company level, kind of responsibility, level of education, age, and gender made a homogenous sample. Using Regression analysis, it is shown that in change situation, intellectual stimulation and individual consideration are the most effective behaviors of a transformational leader those directly increase follower’s trust to the leader. And, among member of an organizational network of people, higher level managers and immediate supervisors facilitate rapid development of the trusting stances among the followers. The results also indicate that members of an organization respond equally for their trusting stances to their leader when the leader demonstrates transformational leadership behaviors. Finally, demographic differences of the respondents had no meaningful impact on the hypothesized relations
Benson, Marie Anne. "Pouvoir prédictif des données d'enquête sur la confiance". Master's thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/69497.
Texto completo da fonteConfidence survey data are time series containting the responses to questions aiming to measure confidence and expectations of economic agents about future economic activity. The richness of these data and their availability in real time attracts the interest of many forecasters who see it as a way to improve their traditional forecasts. In this thesis, I assess the predictive power of survey data for the future evolution of Canadian GDP, while comparing the forecasting performance of the Conference Board of Canada own confidence indices to the indicators I construct using principal component analysis. Using three simple linear models, I carry out an out-of-sample forecasting experiment with rolling windows on the period 1980 to 2019. The results show that principal component analysis provides better-performing indicators than the indices produced by the Conference Board. However, the results of the study cannot show that clear that confidence improves forecasting unambiguently once the lagged growth rate of GDP is added to the analysis.
Moréteau, Olivier Schwarz-Liebermann von Wahlendorf Hans Albrecht. "L'estoppel et la protection de la confiance légitime". Lyon : Université Lyon 3, 2006. http://thesesbrain.univ-lyon3.fr/sdx/theses/lyon3/1990/moreteau_o.
Texto completo da fonteHatin, Julien. "Evaluation de la confiance dans un processus d'authentification". Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC235/document.
Texto completo da fonteIn our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing to online services from its mobile phone is an usual action.In order to authenticate to those services, that might be sensitive, the one and only protection is usually a password. Those passwords must be longer and longer to stay robust.This is a bigger constraint on mobile phones than on desktop computers.Other authentication solutions are dedicated to smartphones, like facial recognition on android and now Apple smartphones or the fingerprint that conquier new phones.To ease the authentication process, biometrics is more and more often used on mobile phones. In addition to the dedicated biometric sensors, it is also possible to use the phone environement to authenticate users.However, if authentication methods are becoming more and more transparent, it brings two questions:How to integrate those new methods within the actual authentication framework ?What is the impact of those new methods on users' privacy ?The main goal of the phD is to offers privacy compliant transparent authentication methods while integrating them in current authentication systems.In this document, we evaluates those two questions by first analyzing existing works on the data collection for transparent authentication on mobile phones. Then, once the data are collected, we will see wich process can enable the privacy protection. To conclude, we will evaluates concretly those solutions by building industrial prototypes
Andrea, Perunović. "Archéologie de la confiance : Prolégomènes d'une pensée défiante". Electronic Thesis or Diss., Paris 8, 2018. http://www.theses.fr/2018PA080111.
Texto completo da fonteAlthough the notion of trust appears regularly throughout the entire history ofphilosophy, the position it occupies in it is marginal. Deplored by some, denigrated by others,the extent of influence that trust imposes on an important number of canonical concepts whichdetermine the human condition has often been overlooked by philosophers. On the other hand,popular current opinion has not missed the chance to grab hold of trust and make it the apparentfoundation of all subjective and social existence. Hence, it is in this tension between diversephilosophical (but also psychanalytical, linguistic and economic) discourses and commonopinion that the object of our study will evolve. In the research that follows, we will try to giveback to trust the status of a concept, just so we can deconstruct it, and by doing so, resist to itstotalizing tendency. In order to do so, we will approach the notion of trust in a speculativemanner, by conducting what is called a philosophical archeology. We should thus examine thearchai of trust, which will reveal themselves in the form of double dialectics. In the first place,an internal dialectic animated by the principles of substitutions and judgements underpinningthe subject will be considered, as well as the principle of value, which is considered the totalfiduciary foundation of society. Secondly, an external dialectic will oppose trust with mistrust,thus demonstrating the bad infinity of their fiduciary becoming. A distrustful thought, anentirely other instance, will eventually arise, to mark the suspension of the progression whichperpetually relapses into the traps of trust
Alchiekh, Haydar Charif. "Les systèmes de recommandation à base de confiance". Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0203/document.
Texto completo da fonteRecommender systems (RS) exploit users' behaviour to recommend to them items they would appreciate. Users Behavioral divergence on the web results in a problem of performance fluctuations to (RS). This problem is observed in the approach of collaborative filtering (CF), which exploites the ratings attributed by users to items, and in the trust-based approach (TRS), which exploites the trust relations between the users. We propose a hybrid approach that increases the number of users receiving recommendation, without significant loss of accuracy. Thereafter, we identify several behavioral characteristics that define a user profile. Then we classify users according to their common behavior, and observe the performance of the approaches by class. Thereafter, we focus on the TRS. The concept of trust has been discussed in several disciplines. There is no real consensus on its definition. However, all agree on its positive effect. Subjective logic (LS) provides a flexible platform for modeling trust. We use it to propose and compare three trust models, which aims to predict whether a user source can trust a target user. Trust may be based on the personal experience of the source (local model), or on a system of mouth (collective model), or the reputation of the target (global model). We compare these three models in terms of accuracy, complexity, and robustness against malicious attacks
Alchiekh, Haydar Charif. "Les systèmes de recommandation à base de confiance". Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0203.
Texto completo da fonteRecommender systems (RS) exploit users' behaviour to recommend to them items they would appreciate. Users Behavioral divergence on the web results in a problem of performance fluctuations to (RS). This problem is observed in the approach of collaborative filtering (CF), which exploites the ratings attributed by users to items, and in the trust-based approach (TRS), which exploites the trust relations between the users. We propose a hybrid approach that increases the number of users receiving recommendation, without significant loss of accuracy. Thereafter, we identify several behavioral characteristics that define a user profile. Then we classify users according to their common behavior, and observe the performance of the approaches by class. Thereafter, we focus on the TRS. The concept of trust has been discussed in several disciplines. There is no real consensus on its definition. However, all agree on its positive effect. Subjective logic (LS) provides a flexible platform for modeling trust. We use it to propose and compare three trust models, which aims to predict whether a user source can trust a target user. Trust may be based on the personal experience of the source (local model), or on a system of mouth (collective model), or the reputation of the target (global model). We compare these three models in terms of accuracy, complexity, and robustness against malicious attacks
Pulgar, P. Jenny, e J. Karla Buhring. "Servicios de confianzas: (estudiante al rescate)". Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/138704.
Texto completo da fontePulgar P., Jenny [Parte I], Buhring J., Karla [Parte II]
El objetivo de este Plan de Marketing, es desarrollar toda la estrategia de Marketing de un nuevo servicio relacionado a ofrecer soluciones para el cuidado del hogar de las personas o familias. “Care”- Estudiantes al Rescate. “Seguridad y confianza en el cuidado de tu hogar, de tus peques y mascotas”. Es una empresa de servicio que busca solucionar la problemática que existe hoy en día con respecto a las necesidades de las personas que viven solas o en familias de la Región Metropolitana sobre poder contar con un servicio de cuidados del hogar, donde a través de un staff de estudiantes de educación superior capacitados en diferentes áreas (parvularia, diferencial, enfermería, veterinarios, entre otros), les brindaremos un servicio de confianza, flexible y seguro, que les ayudará a solucionar los cuidados de su hogar en aspectos como: aseo del hogar, cuidado de niños, mascotas. Dicha propuesta de valor nace de la gran necesidad que existe por parte de las personas solteras y familias de poder contar con este tipo de servicios, donde la escasez de tiempo, sumado a la mayor inserción laboral de la mujer y con la dificultad que hoy existe de poder encontrar una empleada doméstica que cumpla con todas las características buscadas es cada vez más difícil, según cifras entregadas por el INE, en el año 2014 habían cerca de 100 mil empleadas domésticas, lo que representa una disminución en función del año anterior, finalizando el año con una disminución de 37 mil trabajadoras. A su vez las empresas que ofrecen servicios de limpieza, tanto para hogar como para oficinas, tampoco han logrado penetrar bien en el segmento hogar, donde no cuentan con una fuerte comunicación al cliente, y tampoco este último ha preferido este tipo de servicio dado que nos les genera confianza, siguiendo en la búsqueda de “nanas”. A su vez, tenemos que existe un alto porcentaje de estudiantes que tienen ganas de trabajar y estudiar a la vez, pero no hay muchos empleos que compatibilicen ambas cosas. Es así como Care, tiene un gran componente social, en que ofrece mayores posibilidades de trabajo para los estudiantes, ya que hoy en Chile no se cuenta con una empresa de servicios para el hogar que contrate estudiantes. Este nuevo foco es muy atractivo y tiene grandes desafíos a la vez, si bien existen estudios que señalan que 1/3 de los estudiantes de educación superior trabaja y estudia a la vez, hay que investigar bien la propuesta de valor también para ellos, es por esto que hay que investigar bien que les mueve a los estudiantes, donde el factor monetario es uno de ellos, como también el factor de compatibilidad de estudios con trabajo, donde el 76% de los estudiantes que no trabaja se debe a que no logran encontrar trabajos que les permita lograr este cruce. Es muy importante poder trabajar en cómo se le va a proponer a los estudiantes este trabajo, donde hay que hacer bastantes esfuerzos para hacerlo atractivo, considerando que aquí en Chile el trabajo doméstico no esta tan bien valorado como en otros países. Para poder lograr el éxito, el factor clave es la “confianza/seguridad, calidad y flexibilidad en el servicio entregado, ya que se entra en la casa de las personas, donde uno no deja entrar a cualquier persona, es por eso que todos los esfuerzos de marketing y todas las acciones que se desarrollen van a estar dirigidas a lograr ser percibida como la empresa que genera esa confianza, si se logra esto se podrá tener una ventaja competitiva, donde hoy en día ninguna empresa que ofrece estos servicios la explota. Confianza que se puede mediante el cumplimiento de horarios de trabajo, tareas bien elaboradas, capacitación de estudiantes y finalmente la satisfacción de familias, niños y mascotas. Para ello, debemos contar con un grupo humano, quien dará el gran diferencial, es cual será entregado a través de un staff de estudiantes de educación superior, quienes serán altamente capacitados para ofrecer un servicio de confianza.
La baja tasa de natalidad y la alta tasa de inserción laboral femenina, han sido factores que han influenciado en que jefes de hogar tengan una preocupación constante y creciente por quien cuide a sus familias y hogares. Es así como, dueñas de casas (quienes son las que toman las decisiones con respecto a los cuidados del hogar), aseguran que privilegian ha asesoras del hogar quienes se preocupen no solo del cuidado básico de las familias, sino también del aprendizaje y estimulación en niños de edad preescolar. Nuestra propuesta, es que esta demanda de asesoras de hogar sea cubierta por personas más calificadas para cuidados del hogar y especialmente de los niños, por estudiantes universitarios de carreras afines (educadores de párvulos, pedagogía diferencial, enfermería, ingenierías varias). En este segmento, existe la necesidad de poder compatibilizar estudios con trabajo para cubrir gastos personales, pagar el arancel de la carrera, ayudar en los gastos del hogar y desarrollo personal. La principal razón por la cual algunos estudiantes no trabajan por la incompatibilidad de horarios. A nivel nacional, este es un mercado poco desarrollado, existiendo empresas que no capacitan a las personas o que simplemente realizan el contacto entre demandante y oferente. Por lo que generar un servicio sobre los conceptos de calidad, confianza y seguridad puede generar una diferenciación en los servicios de cuidados del hogar
Gagnon, Patrick. "Intervalles de confiance pour une différence de deux proportions". Québec : Université Laval, 2007. http://www.theses.ulaval.ca/2006/24060/24060.pdf.
Texto completo da fonteAbdalla, Michel. "Limiter le besoin de tiers de confiance en cryptographie". Habilitation à diriger des recherches, Ecole Normale Supérieure de Paris - ENS Paris, 2011. http://tel.archives-ouvertes.fr/tel-00917187.
Texto completo da fonteGagnon, Patrick. "Intervalles de confiance pour une différence de deux proportions". Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/24060/24060.pdf.
Texto completo da fonteQuirion, Martin. "Le Parti Québécois et le marketing de la confiance". Thesis, Université Laval, 2012. http://www.theses.ulaval.ca/2012/29029/29029.pdf.
Texto completo da fonteCarlin, Noëlle. "Relation de soin, la confiance à l'épreuve du droit". Phd thesis, Université Paris-Est, 2014. http://tel.archives-ouvertes.fr/tel-01061259.
Texto completo da fonteBothuyne, Ghislaine. "La confiance immanente dans l'épreuve du cancer: démarche autobiographique". Master's thesis, [s.n.], 2010. http://hdl.handle.net/10284/1576.
Texto completo da fonteCette recherche a pour but de mettre en évidence une nouvelle nature de confiance à médiation corporelle. C’est à partir d’un récit autobiographique d’une expérience de maladie du cancer vécue au sein du Sensible qu’une analyse qualitative sera effectuée sur le mode du Sensible. Il en sera ainsi dégagé les apports spécifiques et novateurs de la somatopsychopédagogie dans l’accompagnement oncologique et dans la préservation de la confiance pour traverser cette épreuve. Ce mémoire ouvre quelques pistes de réflexion sur l’intérêt de l’approche corporelle Sensible dans la prise en charge des personnes souffrant de la maladie du cancer, approche qui dévoile également une dimension existentielle dans le parcours de la maladie et du soin. Esta investigação tem como objectivo colocar em evidência uma nova natureza de confiança através da mediação corporal. É a partir de uma narrativa autobiográfica de uma experiência da doença de cancro vivenciada em contacto com o Sensível que uma análise qualitativa será efectuada sobre o modo do Sensível. Serão assim identificadas as contribuições específicas e inovadoras da somato-psicopedagogia no acompanhamento oncológico e na preservação da confiança para atravessar esta prova. Esta dissertação abre algumas pistas de reflexão sobre o interesse da abordagem corporal Sensível no acompanhamento das pessoas que sofrem da doença do cancro, abordagem que revela igualmente uma dimensão existencial no percurso da doença e da cura.
Gagnon, Patrick. "Intervalles de confiance pour une différence de deux proportions". Master's thesis, Université Laval, 2007. http://hdl.handle.net/20.500.11794/18727.
Texto completo da fonteBraconnot, Velloso Pedro. "Un modèle de confiance pour les réseaux ad hoc". Paris 6, 2008. http://www.theses.fr/2008PA066121.
Texto completo da fonteOrfila, Jean-Baptiste. "Evaluation de la confiance dans les architectures de sécurité". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM034/document.
Texto completo da fonteIn a increasingly connected world, trust in information systems is essential. Thus, many questions about their security arise. Topics of these questions include individual data confidentiality as well as protection of Industrial Critical Systems(ICS). For instance, ICS are deployed in sectors including energy or transportation where security is of high importance. In this thesis, we address three problems related to the security architecture of information systems. We first propose an architecture for a protocol splitting device. This provides protection against networkattacks by isolating and filtering data exchanges. We show that this new security equipment is well suited for ICS. Then, we focus on end-user security. We define a user-centric Public Key Infrastructure (PKI) called LocalPKI. By using self-signed certificates, this infrastructure combines the user-friendliness of PGP-based PKI and the security of hierarchical PKI. Finally, we improve the trust anchormechanism. It is employed by Certification Authorities (CA) and especially used in PKIX or LocalPKI. In that respect, we first define multi-party protocols to securely compute dot and matrix products. Then, we explain how to apply them on trust aggregations and thus on the reputation of certification authorities
Beretti, Marie. "La relation d'autorité éducative au prisme de la confiance". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES004/document.
Texto completo da fonteAuthority at elementary school is the main topic of this thesis. The first part of the study is dedicated to the conceptual development aimed at providing a global understanding of educative authority relationship, modelled as a dynamic and complex system. The analysis of the functioning of this relational system, and the methodical investigation of all its elements as well as their connexions, suggests authority as the property of the relationship between teachers and pupils.The second part of the thesis focuses on the theoretical and empirical validation of the hypothesis that a relational system of educative authority benefits from a trust-based relational system, i.e. educative authority and trust relationships tend to complement and reinforce each other in a process of circular causation. This analysis is further extended in the third part of the study, which is looking at the favourable conditions for building pupils’ trust, and the positive influence of trust on the educative authority relationship.Pupils’ subjectivity, both in the educative authority relationship and in the trust relationship, plays a key role in this subject. Hence, theoretical reflection systematically relies on the results of an empirical investigation conducted with three classes of third grade of elementary cycle pupils, who were followed for an entire school year, and observed in situation and interviewed with their teachers
Camilotto, Nicolas. "Trois essais sur la notion de confiance en économie". Electronic Thesis or Diss., Université Côte d'Azur, 2023. http://www.theses.fr/2023COAZ0031.
Texto completo da fonteThe examination of the social bond that unites individuals within a society is a broadand recurrent subject of research in the social sciences. Concepts such as interest, mutualassistance, law, sociability, and sympathy have traditionally influenced how scholars ineconomics, sociology, and political science perceive the social fabric. However, in recentdecades, the concept of trust has emerged as a dominant force, fundamentally transforming the discourse on this topic specially in economics. The study of trust has gained significant traction in the social sciences since the 1990s, resulting in a substantial an interdisciplinary body of literature. This thesis offers a history of these recent transformations, problematized around the tension between the desire to develop an economic approach to trust and the inherently interdisciplinary nature of this subject.The first chapter investigates the transition of the concept of trust from sociologyto economics during a seminar titled “Seminar on Trust and Social Change” which tookplace at King's College Cambridge, from 1985 to 1986. Organized by sociologist DiegoGambetta, this seminar acted as an interface for scientific exchanges and allowed tworesearch programs to exchange methods and objects so as to form an interdisciplinaryprogram on the notion of trust.The second article employs quantitative and computational tools to offer a concise andcomprehensive overview of the research domains related to trust. The analysis carried outallows us to conclude that the fields of research on trust do not fall into a disciplinary partitioning. Consequently, there is no “economics of trust” per se, but rather distinctresearch fields within economics, characterized in part by their varying interactions withother disciplines.The third and final chapter offer to blend historical and methodological perspectives toexamine the Trust Game. Since its publication in 1995 by Berg, Dickhaut, and McCabe, theTrust Game has become the standard methodology for investigating trust experimentallyin economics (as well as in psychology). We demonstrate that historically, the use of theTrust Game in economics is primarily situated at the core of two distinct approaches. Wethen analyze this duality from a methodological standpoint to reveal that it encompassesa divergence in the interpretation of the concept of validity concerning the results ofthe Trust Game. We assert that these validity criteria are overly constrictive to offer asatisfactory economic approach to trust based on the Trust Game
Ebende, Kouedi Sandrine Sara. "Le rôle de la confiance initiale dans la phase d'établissement de la relation consommateur-marque". Thesis, Paris Est, 2013. http://www.theses.fr/2013PEST0050.
Texto completo da fonteThis doctoral research aims to investigate the role of initial trust in the establishment phase of the relationship between consumer and brand. We first conducted an exploratory qualitative study with a sample of 24 subjects. In this study, we opted for a new brand for the interviewees, since it is precisely in this case that the initial trust should be more difficult to establish for the brand. The results of this exploratory study reveal an initial consumer trust towards a new brand which refers to a presumption by the consumer that the new brand is reliable and honest. It is formed from four types of factors: factors related to the brand, to third parties, to individual consumer and to risk perception. In addition, it generates two outcomes that are intention to buy and intention to recommend the brand. We then conducted an online survey among a sample of 421 women to test our research hypotheses. This is done through a questionnaire preceded by a scenario focused on a new brand of anti-wrinkle cream which is designed for research purposes. The results of this study show that: (1) the initial trust towards a new brand is one-dimensional and not two-dimensional concept; (2) some factors positively influence initial trust towards a new brand: the positive perception of word of mouth, point of sale, country of origin and packaging of this brand; (3) other factors negatively influence the initial trust towards a new brand (the perceived high price of this brand) or have no effect on the latter (positive perception of the brand advertising, the propensity to trust, and openness of the consumer); (4) the perceived risk associated with the product category has a moderating effect on the relationship between positive perception of signals emit by companies (the price, country of origin, point of sale, packaging and advertising) and third (word of mouth) on the one hand, and initial trust towards a new brand on the other hand; (5) the initial trust towards a new brand is a determinant of intention to buy and intention to recommend this brand.Keywords: trust, initial trust, brand
Lagerspetz, Olli. "The tacit demand : a study in trust /". Turku : Åbo akademi, 1996. http://catalogue.bnf.fr/ark:/12148/cb358549049.
Texto completo da fonteLegrand, Véronique. "Confiance et risque pour engager un échange en milieu hostile". Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0041.
Texto completo da fonteNowadays, the electronic form of exchanges offers a new media able to make easy all information access, ubiquitous access, everywhere and everytime. But, at the same time, such a media - new, opened and complex - introduces unknown threats and breaches. So, how can we start up trust exchanges? From the system theory point of view, the cybernetic regulation maintains the sys-tems equilibrium with negative feedback loops. In this way, the defense line is based on a set of defense components still named Demilitarized Zone (DMZ) in order to block flow, to control anomalies and give out alerts messages if deviances are detected. Nev-ertheless, most of these messages concern only anomalies of machines and very little of human. So, messages do not take into account neither psychological behavior nor the dynamic of the context. Furthermore, messages suffer of the "big data" problem and become confused due to too much velocity, volume and variety. Finally, we can limit this problem to the understanding difficulty during the access to the specific knowledge in connection with the message. For example, the identity theft with the XSS attack is an illustration of this unfriendly environment. On the contrary, the living sciences show that organisms follow a positive regulation by where each one itself adapts according to his complexity. For that, they deploy adapted and continuous environment monitoring process still named "homeostasis". During this cycle, inputs capture information, then outputs adjust in response corre-sponding actions : this is the feedback. The strength of such a mechanism lies on the information meaning and in particular on the clues they include. In fact, some of these information include clues by which organisms can explain situations. For example, the information « attention" alludes to dangerous situation. This faculty comes from ad-vanced knowledge having first explicit relationship with this information: this relation forms what we call the "cognitive loop". To illustrate this phenomenon, the cognitive sciences often evoke "a friend immediately recognized by her friend" despite he is swal-lowed up in the crowd. But, the cognitive loop should not be broken. Like the living beings functioning, our work propose a cognitive model named Diag-nostic And Incident Model (DIM). The main idea lies on the context-aware model in order to adapt itself like "homeostasis". DIM has been founded on the principle of the "cognitive loop" where the inputs are the "logs" of numerics systems. So, in order to make easier the comparison between contextual and known situation, we will design "logs" and advanced knowledge by a common model. DIM proposes a conceptual struc-ture to extract clues from massive and various "logs” issued from environment based on advanced knowledge acquisition. Then, we propose the cognitive structure will be applied to the anomaly detection, incident management and diagnosis process
Charland, Martin. "La confiance au coeur de l'exil. Récits de réfugiés colombiens". Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/23627/23627.pdf.
Texto completo da fonteKahn, Juliette. "Parole de locuteur : performance et confiance en identification biométrique vocale". Phd thesis, Université d'Avignon, 2011. http://tel.archives-ouvertes.fr/tel-00995071.
Texto completo da fonteDudezert, Franck. "De l'existence d'un principe de confiance légitime en droit privé". Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROD003/document.
Texto completo da fonteThe expression "Principle of legitimate expectation" is generally used, within the French legal literature, as a principle under public law which has already been established in several countries as well as exercised in the Court of Justice of the European Union jurisprudence. Beyond this classic area, some authors argue that such a principle does exist in private law. It would be, for a fraction of them, an explanatory and orientative principle. For another author, there would be several principles. These uncertainties justify interrogation on the basis of the existence of one, or even several principles of "legitimate expectation". Assuming that the answer would be positive, the function of the above-mentioned principle must be ascertained so as to determine if that or these principle(s) have for unique function orientation – or interpretation – and explanation. The present thesis tries to answer in the affirmative for the first question and to give a negative answer to the second one. The first part of this thesis highlights the principle. It argues that the legal frame of defective products regulations as well as the civil liability does punish, through several ways, the breach of the legitimate expectation. This observation assumes that there is a legal norm which requires to respect this legitimate expectation. This norm can only be considered as a general principle of law to the extent that, by virtue of its generality, it shall inspire other norms. The second part of the present thesis deals with the consequences of the principle of legitimate expectation. Several have been identified and two of them are subject to more detailed and substantial development : the forced execution related regulations and the satisfactory function of civil liability
Demir, Levent. "Module de confiance pour externalisation de données dans le Cloud". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM083/document.
Texto completo da fonteData outsourcing to the Cloud has led to new security threats. The main concerns of this thesis are to protect the user data and privacy. In particular, it follows two principles : to decrease the necessary amount of trust towards the Cloud, and to design an architecture based on a trusted module between the Cloud and the clients. Both principles are derived from a new design approach : "Trust The Module, Not The Cloud ".Gathering all the cryptographic operations in a dedicated module allows several advantages : a liberation from internal and external attacks on client side ; the limitation of software to the essential needs offers a better control of the system ; using co-processors for cryptographic operations leads to higher performance.The thesis work is structured into three main sections. In the first section , we confront challenges of a personal Cloud, designed to protect the users’ data and based on a common and cheap single-board computer. The architecture relies on two main foundations : a transparent encryption scheme based on Full Disk Encryption (FDE), initially used for local encryption (e.g., hard disks), and a transparent distribution method that works through iSCSI network protocol in order to outsource containers in Cloud.In the second section we deal with the performance issue related to FDE. By analysing the XTS-AES mode of encryption, the Linux kernel module dm-crypt and the cryptographic co-processors, we introduce a new approach called extReq which extends the cryptographic requests sent to the co-processors. This optimisation has doubled the encryption and decryption throughput.In the final third section we establish a Cloud for enterprises based on a more powerful and certified Hardware Security Module (HSM) which is dedicated to data encryption and keys protection. Based on the TTM architecture, we added "on-the-shelf" features to provide a solution for enterprise