Дисертації з теми "Trust and ethics of computer systems"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Trust and ethics of computer systems".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Van, Wyk Byron Jay. "E-trust: a building block for developing valuable online platforms in Higher Education." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1852.
Повний текст джерелаThe aim of this research project was to provide an answer to the question: “How can an understanding of online trust be used to build valuable online applications in Higher Education?” In order to present an answer to this question, a literature survey was conducted to establish: • An understanding of the phenomenon of online trust • What the factors are that influence a loss of trust in the online environment The literature survey highlighted several factors that influence a loss of trust in the online environment, called trust cues. These factors, however, were often tested within the E-commerce environment, and not in organization-specific contexts, such as online platforms in use in Higher Education. In order to determine whether or not these factors would influence the development of trust in context-specific environments, the author of this research grouped the indentified trust factors into three focus areas, i.e. content, ease of use, and navigation. These factors were then incorporated into a series of nine different prototypes. These prototypes were different versions of a particular online platform currently in use at the Cape Peninsula University of Technology (CPUT). The prototypes were tested over a three week period, with certain staff members at the institution in question recruited as test participants. During each week of user observations, a different focus area was targeted, in order to establish the impact that it would have on the perceived trustworthiness of the platform in question. User observations were conducted while test participants completed a standard process using the various prototypes. Semi-structured interviews were also conducted while participants completed the specific process. Participants were asked to evaluate each screen in the process according to its perceived trust worthiness, by assigning a trust level score. At the completion of the three rounds of user observations, in-depth interviews were conducted with test participants. The participants’ trust level scores for each prototype were captured and graphed. A detailed description for the score given for a particular screen was presented on each graph. These scores were combined to provide an analysis of the focus area tested during the specific round. After the three rounds of user observations were completed, an analysis of all the trust factors tested were done. Data captured during interviews were transcribed, combined with feedback received from questionnaires, and analysed. An interpretation of the results showed that not all trust factors had a similar influence in the development of trust in the online platform under investigation. Trust cues such as content organization, clear instructions and useful content were by far the most significant trust factors, while others such as good visual design elements, professional images of products, and freedom from grammatical and typographical errors had little or no impact in the overall trustworthiness of the platform under investigation. From the analysis done it was clear that the development of trust in organization-specific contexts is significantly different than developing trust in an E-commerce environment and that factors that influence the development of trust in one context might not always be significant in another. In conclusion, it is recommended that when software applications are developed in organization-specific contexts, such as Higher Education, that trust factors such as good content organization, clear instructions and useful content be considered as the most salient. Organization-specific contexts differ quite significantly in that the users of these systems often convey a certain degree of trust toward the online platforms that they work with on a daily basis. Trust factors that are geared toward developing an initial or basic trust in a particular platform, which is often the case with first time users engaging in an E-commerce platform, would therefore not be as significant in the development of a more developed level of trust, which is what is needed within the development of organization-specific online platforms.
Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Повний текст джерелаSchwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
Zhao, Weiliang. "Trust in distributed information systems." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/35454.
Повний текст джерелаA thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.
Повний текст джерелаChan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.
Повний текст джерелаRaval, Maharsh, and Rajkiran Sunkireddy. "Hardware Root of Trust on IoT Gateway." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40120.
Повний текст джерелаHuynh, Trung Dong. "Trust and reputation in open multi-agent systems." Thesis, University of Southampton, 2006. https://eprints.soton.ac.uk/262759/.
Повний текст джерелаMaiden, Wendy Marie. "Dualtrust a trust management model for swarm-based autonomic computing systems /." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Thesis/Spring2010/W_Maiden_6041310.pdf.
Повний текст джерелаTitle from PDF title page (viewed on May 3, 2010). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 110-117).
Lebedev, Ilia Andreevich. "Trust less : shrinking the trusted parts of trusted systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128315.
Повний текст джерелаCataloged from PDF of thesis.
Includes bibliographical references (pages 213-227).
Modern computers, industrial control systems, and other automation are broadly vulnerable as a result of decades of systemic forces that have prioritized cost and performance over security. Computers across the board face a crisis in the form of motivated software adversaries with access to our imperfect and enormously complex software. Considering these weaknesses, trust in modern computing systems is often not well-placed. Looking ahead to a shift in our collective priorities, this thesis is centered around a rigorous discussion of hardware-assisted isolation and enclaves -- authenticated software modules -- as a means to drastically reduce the complexity of trusted systems. By allowing trustworthy enclaved software to co-exist with, but remain strongly isolated from, existing software, we enable a gentle transition toward trustworthy systems. Specifically, this thesis refines formal definitions of enclaved execution and threat model via a series of hardware and software co-designs. These case studies explore enclave processors with small trusted computing bases spanning a gradient from an embedded SoC to a modern high-performance processor. This work is complementary to, and enables more effective application of, many powerful ideas such as information flow control, formal verification, multi-party computation, and other tools for trustworthy computing.
by Ilia Andreevich Lebedev.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Chan, Fuk-Wing Thomas. "Preserving Trust Across Multiple Sessions in Open Systems." BYU ScholarsArchive, 2004. https://scholarsarchive.byu.edu/etd/137.
Повний текст джерелаWei, Chen. "Multi-collaborative filtering trust network for online recommendation systems." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550571.
Повний текст джерелаYoussef, Ingy. "Trust via Common Languages." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1469155513.
Повний текст джерелаRanjit, Narendran. "Multiagent Referral Systems: Maintaining and Applying Trust and Expertise Mode." NCSU, 2007. http://www.lib.ncsu.edu/theses/available/etd-05112007-143631/.
Повний текст джерелаBurnett, Christopher. "Trust assessment and decision-making in dynamic multi-agent systems." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=167031.
Повний текст джерелаYu, Hong. "Creating Public Trust in Electronic Voting Systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224219.
Повний текст джерелаDet finns många positiva aspekter av elektroniska röstningssystem: säkerhet, verifierbarhet, bekvämlighet, resursbesparingar, och liknande. Emellertid så saknas det fortfarande hos allmänheten tillit till elektroniska röstningssystem. Ett av skälen till detta skulle kunna vara att idéerna i samband med elektronisk röstning är utmanande att förstå för allmänheten. I detta projekt har vi försökt att skapa allmän tillit med hjälp av ett förklaringssystem. Ett förklaringssystem tillverkades för att förklara hur ett modernt elektroniskt röstningssystem fungerar. Användartester utfördes därefter, för att verifiera huruvida detta förklaringssystem förmådde öka människors tillit till elektroniska röstningssystem. Efter analys av data insamlade genom användartesterna, fick vi lovande resultat som gav oss anledning att tro att detta slags förklaring kan användas för att skapa allmän tillit till elektroniska röstningssystem.
Lind, Oros Martin. "Designing for Calibrated Trust Towards Operators of Highly Autonomous Vehicle Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283355.
Повний текст джерелаLämpliga nivåer av tillit i högautomatiserade fordon bidrar till ökad säkerhet ur ett människa-maskin perspektiv. Genom att förbättra samverkan i automationen kan tillit kalibreras. Ur en människa-maskin relation och den samverkan som sker kan tillit formas med syftet att tillhandahållas på en acceptabel nivå. När kalibrering av tillit misslyckas och inte motsvarar denna nivå, vilket sker när det finns övertro, eller det motsatta, undertro på automationens förmågor kan säkehetsrisker uppstå. Den här studien undersöker vilka tillitsfaktorer som kan påverka designbeslut och designprocesser med syfte att låta användarnas tillitsnivå motsvara systemets förmåga genom fokus på ett människa-maskin gränssnitt. Semi-strukturerade expertintervjuer har lagt grunden till att genomföra en ”workshop” som givit upphov till ett antal koncept för att möjliggöra lämpliga nivåer av tillit. De huvudsakliga resultaten består följaktligen av ett flertal sätt att uppnå transparens samt flera koncept som kan användas för att designa lämpliga nivåer av tillit.
Billqvist, Ung Malin, and David Neveceral. "Initial trust in e-health systems : How surface level user experience design can influence trust formation." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50175.
Повний текст джерелаCoetzee, Marijke. "WSACT - a model for Web Services Access Control incorporating Trust." Thesis, Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-07102008-075251.
Повний текст джерелаZou, Hai Tao. "Trust-Rank : a Cold-Start tolerant recommender system." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2182855.
Повний текст джерелаSpecter, Michael Alan. "The economics of cryptographic trust : understanding certificate authorities." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104028.
Повний текст джерелаThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 71-75).
Certificate Authorities (CAs) play a crucial role in HTTPS, the mechanism that secures all of the web's most important communication; if it has a log-in page, it must use HTTPS. However, recent history is littered with instances of CAs unabashedly undermining the trust model of the web in favor of economic gain, causing catastrophic harm to users in the process. The purpose of this thesis is to understand how well user, domain owner, and browser vendor controls function in order to evaluate methods of realigning CA incentives. Using a compendium of past incidents of CA failure as a series of natural experiments, along with a large dataset of all publicly available certificate collections, we find that it is possible to causally link a very slight increase in domain owners leaving a CA when a CA acts inappropriately. We further find that the technical architecture of the CA system leaves users without effective control over which CAs they trust, and that browsers face certain difficulty in distrusting larger CAs. The end result is a system where large CAs can unilaterally undermine the trust model of the web without clear repercussion.
by Michael Alan Specter.
S.M. in Technology and Policy
S.M.
Imran, Muhammad. "The impact of consolidating web based social networks on trust metrics and expert recommendation systems." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/385200/.
Повний текст джерелаJun, Seung Won. "Building Robust Peer-to-Peer Information Dissemination Systems Using Trust and Incentives." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14037.
Повний текст джерелаAl-Galby, Mohamed, and Madani Arezou. "Hardware Root of Trust for Linux Based Edge Gateway." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-18846.
Повний текст джерелаAlghamedy, Fatemah. "ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH AUXILIARY INFORMATION IMPUTATION." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/79.
Повний текст джерелаLee, Ally. "An Empirical Investigation of the Role of Information Quality in Citizens' Trust in E-government Systems." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/210.
Повний текст джерелаLennerholt, Christian. "Achieving Trust in IT Outsourcing Relationships." Thesis, University of Skövde, School of Humanities and Informatics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18.
Повний текст джерелаIT outsourcing is a hot topic in today’s demanding environment. Many organizations start to outsource information technology in order to achieve benefits such as cost reduction, improve quality of service, and focus on the core competence. However, IT outsourcing projects are not an easy task to manage and many projects fail even though there exists a lot of research within the area. In order to increase the possibility to achieve project success, today’s literature indicates that trust is an important factor to achieve. This thesis aim is to identify and describe the process of how to achieve trust in IT outsourcing relationships. The methodology is a literature study as its purpose is to cover the aspects of trust and how the literature proposes how to achieve trust in IT outsourcing relationships.
Relevant literature has been identified, analyzed, and categorized in order to define the thesis concepts and to create a framework based on critical success factors of how to achieve trust in IT outsourcing relationships. The framework can be used as a guiding principle of how organizations can achieve trust in IT outsourcing relationships to increases the possibility to achieve project success. The framework can also raise the awareness that makes it possible to deal with different IT outsourcing situations.
Taqieddin, Eyad Salah. "Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/dissertation_09007dcc8033e18a.pdf.
Повний текст джерелаVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed October 25, 2007) Includes bibliographical references.
Althuru, Dharan Kumar Reddy. "Distributed Local Trust Propagation Model and its Cloud-based Implementation." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1400649603.
Повний текст джерелаReid, Michael Hubert. "Integrating Trust and Computer Self-Efficacy into the Technology Acceptance Model: Their Impact on Customers' Use of Banking Information Systems in Jamaica." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/283.
Повний текст джерелаLarsson, Göran. "Integrating Ethical Considerations in Computerized Information Systems." Thesis, University of Skövde, Department of Computer Science, 1999. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-401.
Повний текст джерелаThis work concerns ethics applied to computer technology, emphasizing the use of this technology within organizations. Computer technology has created the possibility to do things not possible before, for good and bad. Ethical reasoning can be used as a tool to provide guidance, in order to create Computerized Information Systems (CIS) that are sustainable with respect to the ethical demands that can be put upon them.
If one wants to integrate ethical considerations into a CIS, it is reasonable that ethical issues should be taken account of in systems development. As a general methodology for developing a CIS, the Systems Development Life Cycle (SDLC) will be examined. The SDLC is the place and moment when it is possible to integrate ethical considerations into a CIS.
This work will focus on, and try to explain, what characteristics are necessary in order to be able to apply ethical considerations to a methodology. This is done by examining five methodologies adopting the SDLC. It will also be examined how the three major ethical theories utilitarianism, deontologism and rights ethics will affect the SDLC, and thus eventually a CIS being implemented.
The outcome of this work are that there are limited possibilities of integrating ethical considerations into methodologies adopting a hard system approach, compared to those adopting a soft one. The ethical standards of a CIS must be established early on in the SDLC. Integration of ethical issues requires a system approach to be applied in the SDLC. Participation becomes an important feature of systems development in order to adopt ethical reasoning. The different ethical theories will put different emphasis on the group or the individual in systems development.
Haviland, Hannah. ""The Machine Made Me Do It!" : An Exploration of Ascribing Agency and Responsibility to Decision Support Systems." Thesis, Linköping University, Centre for Applied Ethics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2922.
Повний текст джерелаAre agency and responsibility solely ascribable to humans? The advent of artificial intelligence (AI), including the development of so-called “affective computing,” appears to be chipping away at the traditional building blocks of moral agency and responsibility. Spurred by the realization that fully autonomous, self-aware, even rational and emotionally-intelligent computer systems may emerge in the future, professionals in engineering and computer science have historically been the most vocal to warn of the ways in which such systems may alter our understanding of computer ethics. Despite the increasing attention of many philosophers and ethicists to the development of AI, there continues to exist a fair amount of conceptual muddiness on the conditions for assigning agency and responsibility to such systems, from both an ethical and a legal perspective. Moral and legal philosophies may overlap to a high degree, but are neither interchangeable nor identical. This paper attempts to clarify the actual and hypothetical ethical and legal situations governing a very particular type of advanced, or “intelligent,” computer system: medical decision support systems (MDSS) that feature AI in their system design. While it is well-recognized that MDSS can be categorized by type and function, further categorization of their mediating effects on users and patients is needed in order to even begin ascribing some level of moral or legal responsibility. I conclude that various doctrines of Anglo legal systems appear to allow for the possibility of assigning specific types of agency – and thus specific types of legal responsibility – to some types of MDSS. Strong arguments for assigning moral agency and responsibility are still lacking, however.
Wells, Raymond Cleophas. "An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The Bahamas." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/335.
Повний текст джерелаWagner, Alan Richard. "The role of trust and relationships in human-robot social interaction." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31776.
Повний текст джерелаCommittee Chair: Arkin, Ronald C.; Committee Member: Christensen, Henrik I.; Committee Member: Fisk, Arthur D.; Committee Member: Ram, Ashwin; Committee Member: Thomaz, Andrea. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Helldin, Tove. "Transparency for future semi-automated systems : effects of transparency on operator performance, workload and trust." Doctoral thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-34619.
Повний текст джерелаFler och fler komplexa semiautomatiserade system utvecklas idag, vilka hjälper operatörer att samla in och analysera data och information och även att rekommendera beslut och agera på dessa. Det yttersta målet med implementeringen av automatiserade system är ofta att hjälpa operatörerna att fatta bättre beslut snabbare och samtidigt minska deras arbetsbelastning. Dock blir detta inte alltid fallet och flera olyckor har uppmärksammat faktumet att introduktionen av automatiserade system istället kan öka behovet av mänsklig inblandning och expertis. Inom forskningsområden såsom automationstransparens och operatörscentrerad automation har vikten av att kommunicera information angående automationens prestanda betonats, likaså att förklara dess styrkor och svagheter för operatörerna. Dock är det inte vanligt att sådan meta-information inkorporeras i de automatiska systemens primära användargränssnitt, vilket kan försvåra det för operatörerna att tillgodogöra sig denna information. I denna avhandling undersöks effekterna av att förklara och visualisera semiautomatiserade systems resonerande och prestanda i olika domäner på operatörernas tillit till systemen, deras upplevda arbetsbörda och deras prestation. Olika konceptprototyper har designats med inkorporerade transparensegenskaper och kvalitativa och kvantitativa utvärderingar tillsammans med operatörer av dessa system har genomförts. Resultaten visar att automationstransparens kan ha positiva effekter på operatörers prestanda och tillitskalibrering, dock med möjliga kostnader i form av högre upplevd arbetsbelastning och längre beslutstider. Avhandlingen erbjuder även rekommendationer till designers och utvecklare i form av generella riktlinjer och designegenskaper vid utvecklandet av framtida transparenta semiautomatiserade stödsystem.
The author is also affiliated to the university of Skövde
This research has been founded by The Swedish Governmental Agency for InnovationSystems (Vinnova) through the National Aviation Engineering Research Program(NFFP5-2009-01315) and supported by Saab AB.
Sahinkaya, Ferhat. "A Content Boosted Collaborative Filtering Approach For Recommender Systems Based On Multi Level And Bidirectional Trust Data." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612013/index.pdf.
Повний текст джерелаpreferable data&rdquo
that has not already been consumed by the user. Traditional approaches use user/item similarity or item content information to filter items for the active user
however most of the recent approaches also consider the trustworthiness of users. By using trustworthiness, only reliable users according to the target user opinion will be considered during information retrieval. Within this thesis work, a content boosted method of using trust data in recommender systems is proposed. It is aimed to be shown that people who trust the active user and the people, whom the active user trusts, also have correlated opinions with the active user. This results the fact that the rated items by these people can also be used while offering new items to users. For this research, www.epinions.com site is crawled, in order to access user trust relationships, product content information and review ratings which are ratings given by users to product reviews that are written by other users.
Raj, Himanshu. "Virtualization services scalable methods for virtualizing multicore systems /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22677.
Повний текст джерелаCommittee Chair: Schwan, Karsten; Committee Member: Ahamad, Mustaq; Committee Member: Fujimoto, Richard; Committee Member: Gavrilovska, Ada; Committee Member: Owen, Henry; Committee Member: Xenidis, Jimi.
Edwards, Charles Kumar. "A Framework for the Governance of Information Security." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/143.
Повний текст джерелаVijay, Nishanth. "Detection of plant diseases in tomato leaves : With focus on providing explainability and evaluating user trust." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20568.
Повний текст джерелаVan, Sophie. "Encouraging moral reflection in digital games : Feedback systems and their effects." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-12542.
Повний текст джерелаErcan, Eda. "Probabilistic Matrix Factorization Based Collaborative Filtering With Implicit Trust Derived From Review Ratings Information." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612529/index.pdf.
Повний текст джерелаChanko, Elisabeth. "Factors that influence users' perceptions of trust in e-commerce." Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-888.
Повний текст джерелаThe popularity of personal computers and recent advances in Internet technology has provided companies with a new medium for selling their products and increasing their customer base. Due to the influx and acceptance of these new possibilities for both users and businesses, all the more organizations are choosing to exploit electronic commerce. This concept is nothing new or novel, but over the years recent development in the domain of e-commerce has increased tremendously and it has become more commonplace and viable as a solution for customers to easily and effectively shop for products and services. One reason for users not to do an online purchase is feelings of uncertainty and dependency on the unknown, but more importantly a lack of trust for the vendor and the technology involved in the transaction. The focus of this report is on aspects of user trust in business-to-consumer e-commerce and how specific factors of e-commerce, i.e., usability, web site design, security, transference and privacy, influence user trust in e-businesses.
Eleven respondents who had some experience in e-commerce purchases were interviewed using open-ended questions to find out how they perceived trust in general and how certain factors influence their perception of trust in e-commerce. The results of this study show that usability, web site design, security, and transference and privacy, directly influence user trust in e-businesses since these factors lie closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase.
Vance, Anthony Osborn. "Trusting IT Artifacts: How Trust Affects our Use of Technology." unrestricted, 2009. http://etd.gsu.edu/theses/available/etd-04292009-142512/.
Повний текст джерелаTitle from file title page. Detmar W. Straub, committee chair; Mikko Siponen, A. Faye Borthick, Arun Rai, Michel Kalika, committee members. Description based on contents viewed July 14, 2009. Includes bibliographical references.
Hambly, Robert. "An Empirical Investigation of the Willingness of US Intelligence Community Analysts to Contribute Knowledge to a Knowledge Management System (KMS) in a Highly Classified and Sensitive Environment." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/991.
Повний текст джерелаCampano, Erik. "Online Shaming : Ethical Tools for Human-Computer Interaction Designers." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-172899.
Повний текст джерелаWestergren, Ulrika H. "Disentangling sociomateriality : an exploration of remote monitoring systems in interorganizational networks." Doctoral thesis, Umeå universitet, Institutionen för informatik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-43488.
Повний текст джерелаGray, John Max. "Virtue Ethics: Examining Influences on the Ethical Commitment of Information System Workers in Trusted Positions." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/364.
Повний текст джерелаMcCullagh, Adrian J. "The incorporation of trust strategies in digital signature regimes." Thesis, Queensland University of Technology, 2001.
Знайти повний текст джерелаPethrus, Anton. "Informationens effekt i moraliska dilemman : Effekterna mängden tillgänglig information har på spelares beslut i prohibition dilemman." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13734.
Повний текст джерелаRadhakrishnan, Rahul Lal. "A Method to Improve the Security of Information Diffusion in Complex Networks— Node Trust Value Management Mechanism." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42447.
Повний текст джерелаMohan, Apurva. "Design and implementation of an attribute-based authorization management system." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39585.
Повний текст джерела