Wyniki wyszukiwania dla: TRUST LEVELS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: TRUST LEVELS

Wyniki wyszukiwania dla: TRUST LEVELS

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Pełny tekst do pobrania w portalu

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Pełny tekst do pobrania w portalu

  • Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19

    Publikacja

    - CURRENT PSYCHOLOGY - Rok 2022

    A vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...

  • Expedited Trust-Region-Based Design Closure of Antennas by Variable-Resolution EM Simulations

    Publikacja

    - Rok 2021

    The observed growth in the complexity of modern antenna topologies fostered a widespread employment of numerical optimization methods as the primary tools for final adjustment of the system parameters. This is mainly caused by insufficiency of traditional design closure approaches, largely based on parameter sweeping. Reliable evaluation of complex antenna structures requires full-wave electromagnetic (EM) analysis. Yet, EM-driven...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The importance of trust and altruistic social orientation for COVID-19 distress

    Publikacja

    - Current Issues in Personality Psychology - Rok 2023

    Background: The COVID-19 pandemic, the biggest global health crisis in decades, has been a difficult experience for nations all over the world. In the present study we wanted to assess to what extent a positive attitude towards others, expressed in altruistic social orientation and a high level of trust, would be linked to lower levels of COVID-19 distress in infected and non-infected individuals. Participants and procedure:...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Otwarte innowacje w inicjatywach klastrowych

    Publikacja

    - PRZEGLĄD ORGANIZACJI - Rok 2019

    Specyfika funkcjonowania inicjatyw klastrowych czyni z nich idealne podłoże do wcielania w życie idei open innovation – ułatwiają bowiem nawiązywanie kontaktów z innymi podmiotami, stawiają na otwartość swoich członków i budowę relacji opartych na zaufaniu, stanowią platformę wymiany zasobów (w tym przede wszystkim informacji i wiedzy) oraz wspólnego kreowania rozwiązań innowacyjnych. W artykule podjęto rozważania teoretyczne dotyczące...

    Pełny tekst do pobrania w portalu

  • Rapid design closure of linear microstrip antenna array apertures using response features

    Publikacja

    A simple yet reliable approach to a rapid design closure of linear antenna array apertures at the electromagnetic (EM)-simulation level is proposed. Our methodology exploits an underlying array factor (AF) model suitably corrected by means of characteristic points (angles and levels) of the radiation pattern of the EM model of the antenna array aperture. This conveniently allows for controlling both the side lobe levels...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rapid design optimization of antennas using variable-fidelity EM models and adjoint sensitivities

    Publikacja

    - ENGINEERING COMPUTATIONS - Rok 2016

    Purpose – Development of techniques for expedited design optimization of complex and numerically expensive electromagnetic (EM) simulation models of antenna structures validated both numerically and experimentally. The paper aims to discuss these issues. Design/methodology/approach – The optimization task is performed using a technique that combines gradient search with adjoint sensitivities, trust region framework, as well as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme

    The importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...

    Pełny tekst do pobrania w portalu

  • Optimization-Based Robustness Enhancement of Compact Microwave Component Designs with Response Feature Regression Surrogates

    The ability to evaluate the effects of fabrication tolerances and other types of uncertainties is a critical part of microwave design process. Improving the immunity of the device to parameter deviations is equally important, especially when the performance specifications are stringent and can barely be met even assuming a perfect manufacturing process. In the case of modern miniaturized microwave components of complex topologies,...

    Pełny tekst do pobrania w portalu

  • Bodybuilders and high-level meat consumers’ behavior towards rabbit, beef, chicken, turkey, and lamb meat: A comparative review

    Publikacja
    • S. A. Siddiqui
    • S. Bhowmik
    • M. Afreen
    • İ. Ucak
    • A. Ikram
    • F. Gerini
    • M. Mehdizadeh
    • R. D. Ayivi
    • R. Castro Munoz

    - NUTRITION - Rok 2024

    In bodybuilders’ diets, protein plays a crucial role in supporting muscle growth and repairing damaged muscle tissue. These individuals meet their protein needs by combining dietary sources with supplements. Animal-based proteins are often preferred over plant-based proteins because they are believed to better support muscle protein synthesis. This review explores the meat consumption patterns of bodybuilders and high-level meat...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust triggers and barriers in intercultural teams

    Intercultural teams are more and more popular nowadays — they constitute a serious challenge in terms of effective cooperation and trust building, however. The article presents the potential problems that can affect intercultural cooperation and stresses the power of trust in cultural diversity conditions. The ten-factor model of intercultural team trust is presented. The main aim was to answer the questions: what are the differences...

    Pełny tekst do pobrania w portalu

  • The effects of relational and psychological capital on work engagement: the mediation of learning goal orientation

    Publikacja

    - JOURNAL OF ORGANIZATIONAL CHANGE MANAGEMENT - Rok 2022

    Purpose – This paper proposes a research model in which learning goal orientation (LGO) mediates the impacts of relational capital and psychological capital (PsyCap) on work engagement. Design/methodology/approach – Data obtained from 475 managers and employees in the manufacturing and service industries in Poland were utilized to assess the linkages given above. Common method variance was controlled by the unmeasured latent method...

    Pełny tekst do pobrania w portalu

  • Trust case - a case for trustworthiness of IT infrastructures

    Publikacja

    - Rok 2005

    Artykuł prezentuje podejście do budowy argumentów (trust case) uzasadniających zaufanie do systemów i infrastruktur IT. Wprowadza system pojęć związanych ze strukturą i treścią trust case, identyfikuje udziałowców trust case oraz dyskutuje możliwość wsparcia narzędziowego procesu zarządzanie trust case. Omawia równiez krótko dotychczasowe zastosowania tego podejścia.

  • Trust in Electronic Word-of-Mouth (eWOM): the concept and the most important determinants

    Publikacja

    - Rok 2022

    eWOM and trust in it is now the most important factor in determining buyers' purchasing behavior. Familiarity with the determinants of trust establishes the formation of appropriate marketing activities. However, the growing number of new forms of eWOM and its increasingly complex and multidimensional nature have created a lot of confusion. The article aims to organize the concepts related to trust in eWOM, to indicate the most...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection

    Publikacja

    - Rok 2016

    We propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dis/Trust and data-driven technologies

    Publikacja

    - Internet Policy Review - Rok 2023

    This concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...

    Pełny tekst do pobrania w portalu

  • Implementing decisional trust: a first approach for smart reliable systems

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Representing and appraising Toulmin model arguments in trust cases

    The paper presents a Toulmin-based argument model used in trust cases, which allows to argue various properties of IT systems. Argument patterns encountered in trust cases are discussed together with some real-life examples. A method of argument appraisal is introduced together with the corresponding aggregation mechanism. Practical applications of trust cases in industrial and research projects are outlined.

    Pełny tekst do pobrania w portalu

  • Supporting compliance with safety standards by trust case templates

    Publikacja

    - Rok 2007

    Standard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...

  • Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)

    Publikacja

    - Rok 2024

    This paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...

    Pełny tekst do pobrania w portalu

  • How can we justify trust in software based systems?

    Publikacja

    - Rok 2005

    Artykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publikacja

    - Rok 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • An approach to evaluation of arguments in trust cases

    Publikacja

    - Rok 2008

    Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...

  • An Approach to Trust Case Development

    Publikacja

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Pełny tekst do pobrania w portalu

  • Collaborative approach to trustworthiness of it infrastructures

    Publikacja

    - Rok 2005

    Artykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...

  • Reduced-Cost Microwave Design Closure by Multi-Resolution EM Simulations and Knowledge-Based Model Management

    Parameter adjustment through numerical optimization has become a commonplace of contemporary microwave engineering. Although circuit theory methods are ubiquitous in the development of microwave components, the initial designs obtained with such tools have to be further tuned to improve the system performance. This is particularly pertinent to miniaturized structures, where the cross-coupling effects cannot be adequately accounted...

    Pełny tekst do pobrania w portalu

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing

    The literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...

    Pełny tekst do pobrania w portalu

  • Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty

    This paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Argument strategies and patterns of the Trust-IT framework

    Artykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...

  • Using evidence based arguments to support trust

    Publikacja

    - Rok 2013

    Wprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Pełny tekst do pobrania w portalu

  • Trust and Distrust in e-Democracy

    Publikacja

    - Rok 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publikacja

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Pełny tekst do pobrania w portalu

  • Praca z normą Common Criteria wspomagana szablonami Trust Case

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....

  • Trust, Collaborative Culture and Tacit Knowledge Sharing in Project Management–a Relationship Model

    Publikacja

    The aim of this research is to study the relationship between Trust, Collaborative Culture, and Tacit Knowledge Sharing in Project Management as a source of Team Creativity in the context of delivering value through knowledge. For this purpose authors conducted a study of 514 Polish professionals with different functions and experience in managing projects in construction industry. The data collected during the study has been analysed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The KLC Cultures' Synergy Power, Trust, and Tacit Knowledge for Organizational Intelligence

    Publikacja

    This paper examines the impact of knowledge, learning, and collaboration culturessynergy (the KLC approach) on organizational adaptability. The SEM analysis method was applied to verify the critical assumption of this paper: that the KLC approach and trust support knowledge-sharing processes (tacit and explicit) and are critical for organizational intelligence activation.Specifically, the empirical evidence, based on a 640-case...

    Pełny tekst do pobrania w portalu

  • Trust and Distrust in e-Democracy

    Publikacja

    - Rok 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...

    Pełny tekst do pobrania w portalu

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Pełny tekst do pobrania w portalu

  • Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?

    Publikacja
    • A. Ojo
    • N. Rizun
    • G. S. Grace
    • W. Przychodzen
    • M. Isazad Mashinchi
    • C. Foley
    • D. Rohde

    - HEALTH POLICY - Rok 2023

    National surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...

    Pełny tekst do pobrania w portalu

  • The effects of perceived risk, brand value, and brand trust on eWOM

    Publikacja

    Unrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...

    Pełny tekst do pobrania w portalu

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • A theoretical framework for understanding trust and distrust in internet voting

    Publikacja

    - Rok 2022

    Each and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...

    Pełny tekst do pobrania w portalu

  • Practical Evaluation of Internet Systems' Security Mechanisms

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Pełny tekst do pobrania w portalu

  • Trust Management Method for Wireless Sensor Networks

    Publikacja

    - Rok 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Pełny tekst do pobrania w portalu

  • Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation

    Publikacja
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - TELEMATICS AND INFORMATICS - Rok 2024

    The academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling

    In the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...

    Pełny tekst do pobrania w portalu

  • Specification-Oriented Automatic Design of Topologically Agnostic Antenna Structure

    Publikacja

    - Rok 2024

    Design of antennas for modern applications is a challenging task that combines cognition-driven development of topology intertwined with tuning of its parameters using rigorous numerical optimization. However, the process can be streamlined by neglecting the engineering insight in favor of automatic de-termination of structure geometry. In this work, a specification-oriented design of topologically agnostic antenna is considered....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publikacja

    - Rok 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Pełny tekst do pobrania w portalu