Filtry
wszystkich: 249
-
Katalog
Wyniki wyszukiwania dla: trust-it
-
Network relationship’s transformation as the effect of the development of trust in cooperation with a foreign partner
Publikacja -
Using Dempster-Shafer approach to support reasoning about trust in IT infrastructures
PublikacjaW artykule przedstawiono zastosowanie podejścia Dempstera-Shafera do do wnioskowania o poziomie zaufania do infrastruktur TI.
-
Trust, Collaborative Culture and Tacit Knowledge Sharing in Project Management–a Relationship Model
PublikacjaThe aim of this research is to study the relationship between Trust, Collaborative Culture, and Tacit Knowledge Sharing in Project Management as a source of Team Creativity in the context of delivering value through knowledge. For this purpose authors conducted a study of 514 Polish professionals with different functions and experience in managing projects in construction industry. The data collected during the study has been analysed...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublikacjaTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublikacjaThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Molecular dynamics and verisimilitude - to what extent can one trust a computational simulation?
PublikacjaFor the last several tens of years, computer simulations have become of undeniable importance. Molecular Dynamics (MD) simulation techniques are used to examine the phenomena which occur at the level that cannot be observed directly. Thus, they can be successfully exploited in many different scientific fields such as: materials science, applied mathematics and theoretical physics, biochemistry, biophysics or drug design. Despite...
-
Design centering of compact microwave components using response features and trust regions
PublikacjaFabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...
-
Consumer Trust in Online Advertising - How Negative Perception Impacts its Effectiveness
Publikacja -
Using trust management model for detection of faulty nodes in Wireless Sensor Networks
Publikacja -
Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19
PublikacjaA vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...
-
Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling
PublikacjaIn the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublikacjaThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Expedited Trust-Region-Based Design Closure of Antennas by Variable-Resolution EM Simulations
PublikacjaThe observed growth in the complexity of modern antenna topologies fostered a widespread employment of numerical optimization methods as the primary tools for final adjustment of the system parameters. This is mainly caused by insufficiency of traditional design closure approaches, largely based on parameter sweeping. Reliable evaluation of complex antenna structures requires full-wave electromagnetic (EM) analysis. Yet, EM-driven...
-
Trust in the source of received information as a factor related to public perception of shale gas drilling
Publikacja -
Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?
PublikacjaNational surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...
-
The KLC Cultures Synergy for Organizational Agility. Trust, Risk-Taking Attitude, and Critical Thinking as Moderators
PublikacjaOrganizational agility is visible in organizational change adaptability, and it is based on the development of dynamic capabilities, strategic sensitivity of leaders, accuracy and timing of decision-making, learning aptitude, flexibility in thinking and acting, and smooth resource flow across organizations, including the knowledge resource. In such a context, this study aimed to expose how the knowledge, learning, and collaboration...
-
Fast EM-driven size reduction of antenna structures by means of adjoint sensitivities and trust regions
PublikacjaIn this letter, a simple yet robust and computationally efficient optimization technique for explicit size reduction of antenna structures is presented. Our approach directly handles the antenna size as the main design objective, while ensuring satisfactory electrical performance by means of suitably defined penalty functions. For the sake of accuracy, the antenna structure is evaluated using high-fidelity EM simulation. In order...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
A Novel Trust-Region-Based Algorithm with Flexible Jacobian Updates for Expedited Optimization of High-Frequency Structures
PublikacjaSimulation-driven design closure is mandatory in the design of contemporary high-frequency components. It aims at improving the selected performance figures through adjustment of the structure’s geometry (and/or material) parameters. The computational cost of this process when employing numerical optimization is often prohibitively high, which is a strong motivation for the development of more efficient methods. This is especially...
-
EM-Driven Multi-Objective Optimization of a Generic Monopole Antenna by Means of a Nested Trust-Region Algorithm
PublikacjaAntenna structures for modern applications are characterized by complex and unintuitive topologies that are difficult to develop when conventional experience-driven techniques are of use. In this work, a method for automatic generation of antenna geometries in a multi-objective setup has been proposed. The approach involves optimization of a generic spline-based radiator with adjustable number of parameters using a nested trust-region-based...
-
Expedited Design Closure of Antenna Input Characteristics by Trust Region Gradient Search and Principal Component Analysis
PublikacjaOptimization-based parameter tuning has become an inherent part of contemporary antenna design process. For the sake of reliability, it is typically conducted at the level of full-wave electromagnetic (EM) simulation models. This may incur considerable computational expenses depending on the cost of an individual EM analysis, the number of adjustable variables, the type of task (local, global, single-/multi-objective optimization),...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublikacjaTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs
PublikacjaPrzedstawiono ramy wymiany informacji reputacyjnej pomiędzy terminalami sieci mobilnej ad hoc lub sensorowej, prowadzące do efektywnej lokalizacji terminali egoistycznych i jednocześnie zapobiegające skutkom fałszywych rekomendacji. Integrację miar zaufania i rekomendacji reputacyjnych oparto na teorii Dempstera-Shafera.
-
Exploring COVID-19 Conspiracy Theories: Education, Religiosity, Trust in Scientists, and Political Orientation in 26 European countries
PublikacjaThe COVID-19 virus disseminated globally at an accelerated pace, culminating in a worldwide pandemic; it engendered a proliferation of spurious information and a plethora of misinformation and conspiracy theories (CTs). While many factors contributing to the propensity for embracing conspiracy ideation have been delineated, the foremost determinant influencing individuals’ proclivity towards CT endorsement appears to be their...
-
Reduced-cost constrained miniaturization of wideband antennas using improved trust-region gradient search with repair step
PublikacjaIn the letter, an improved algorithm for electromagnetic (EM)-driven size reduction of wideband antennas is proposed. Our methodology utilizes variable-fidelity EM simulation models, auxiliary polynomial regression surrogates, as well as multi-point response correction. The constraint handling is implicit, using penalty functions. The core optimization algorithm is a trust-region gradient search with a repair step added in order...
-
Exploring COVID-19 conspiracy theories: education, religiosity, trust in scientists, and political orientation in 26 European countries
Publikacja -
Employee Well-being in the Perspective of Positive Psychology and of the Job Demands-Resources Theory. The Role of Trust Within the Organization
Publikacja -
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublikacjaThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
Reduced-cost electromagnetic-driven optimisation of antenna structures by means of trust-region gradient-search with sparse Jacobian updates
PublikacjaNumerical optimisation plays more and more important role in the antenna design. Because of lack of design-ready theoretical models, electromagnetic (EM)-simulation-driven adjustment of geometry parameters is a necessary step of the design process. At the same time, traditional parameter sweeping cannot handle complex topologies and large number of design variables. On the other hand, high computational cost of the conventional...
-
SPIRITUALITY AND JOB SATISFACTION. MEDIATING ROLE OF STRESS, GRATITUDE TOWARDS ORGANIZATION AND TRUST IN SUPERVISOR. MODERATING ROLE OF RELIGIOUS PRACTICES
Publikacja -
Trusts & Trustees
Czasopisma -
Numerical optimization of planar antenna structures using trust-region algorithm with adaptively adjusted finite differences
Dane BadawczeThe dataset contains initial designs and optimization results for three planar structures that include quasi-patch antenna for WLAN applications, compact spline-parameterized monopole dedicated for ultra-wideband applications, as well as rectifier for energy harvesting with enhanced bandwidth. The numerical results for the first two structures are also...
-
International Journal of Trust Management in Computing and Communications
Czasopisma -
International Conference on Trust Management
Konferencje -
International Journal of Security, Privacy an d Trust Management
Czasopisma -
International Conference on Principles of Security and Trust
Konferencje -
Annual Conference on Privacy, Security and Trust
Konferencje -
International Conference on Trust, Privacy and Security in Digital Business
Konferencje -
Reconfigurable Antennas for Trustable Things
PublikacjaIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
International Conference on Trust, Security and Privacy in Computing and Communications (IEEE/IFIP International Symposium on Trusted Computing and Communications)
Konferencje -
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublikacjaW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...
-
Collaborative approach to trustworthiness of it infrastructures
PublikacjaArtykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...
-
Focused crawler for trustworthy healthcare information search
PublikacjaArtykuł zawiera opis prac wykonanych w projekcie 6 Programu Ramowego Unii Europejskiej: Personalised Information Platform for life and health Services (PIPS). Głównym celem projektu jest zapewnienie obywatelowi Unii kompleksowego wspomagania w zakresie zagadnień ochrony zdrowia oraz odżywiania. Do realizacji tego celu konieczne jest pozyskanie i dostarczenie obywatelowi wiarygodnej, prawdziwej i aktualnej informacji z tych dziedzin....
-
Defining trustworthiness in Semantic Web by ontological assertions
PublikacjaW artykule opisano model systemu zarządzania wiedzą z uwzględnieniem aspektów wiarygodności. Zaproponowano również metodę definiowania wiarygodności w Sieci Semantycznej i wnioskowania z wiedzy wzbogaconej o opis jej wiarygodności. Opisana metoda dostarcza sposobu wzbogacenia ontologii o opis wiarygodności asercji zdefiniowanych w tej ontologii. Definiowanie wiarygodności jest rozumiane jako przypisanie zbioru cech do asercji binarnych...
-
Real estate investment trusts in Turkey: Structure, analysis, and strategy
PublikacjaPurpose-Aim of this study is to make the determinations related to the problems mentioned in the REIT sector in Turkey, to offer a solution for this issue, and to ensure the classification in the sector by adhering to the financial data of the REITsMethodology-Financial data set of the REITs was firstly standardized by using median instead of mean. Then, the scoring was performed according to defined coefficients....
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublikacjaThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Information Assurance Group (IAG)
Zespoły BadawczeGrupa koncentruje się na zarządzaniu ryzykiem i zaufaniem w odniesieniu do różnych cech oprogramowania i systemów informatycznych, np. Bezpieczeństwa, niezawodności i prywatności. Szczególnie interesujące jest pojęcie Trust Case i powiązanej metodologii Trust-it.
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Towards trustworthy multi‐modal motion prediction: Holistic evaluation and interpretability of outputs
Publikacja