The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Any system, company or complex task is composed by processes, i.e., sequences of actions performed in some established order. Some of these processes are considered sensitive for the role they play within the system, or for the sensitive data they manage. In such cases, the trust in this processes is desirable, requiring their verification, monitoring, auditing, but also the possibility of being insured...
When auditing the large enterprise groups with many accounting subjects, in order to find. the doubtful auditing points quickly in the mass electronic data, we designed and developed a accounting report procedure for single subject according to the logic of balance sheet with the parallel simulation; adopted the associative rules to mine the audit features of electronic data, and combined with the...
P2P systems have a dynamic open and anonymous characteristic, which restricts P2P system of cooperation between the users and system reliability and availability. A subjective trust model of P2P network based on reputation and risk is presented to solve the problem. Taking into account the influence on the calculation of confidence at different periods of trading, time decay function which different...
As P2P system has dynamic open and anonymous characteristics, and these seriously restrict P2P system of cooperation between the users and system reliability and availability. To solve the above problems, a trust model of P2P network based on reputation and risk is presented. Taking into account the influence on the calculation of confidence at different periods of trading, time decay function which...
The purpose of this paper is to develop a conceptual model for e-government acceptance in public sector which is one of the least studied aspects of e-government. The proposed model uses theories from technology acceptance and success and the diffusion of ICT-related innovations. It integrates constructs from the technology acceptance model (TAM), the theoretical extension of the TAM (TAM2), the diffusion...
This paper analyzes all possible kinds of risks in the executive process of BOT projects bidding program and studies the problems of risk assessment of BOT projects bidding program. First of all, this paper constructs the indicator system of risk evaluation from the point of main sources of risk. Then, it makes the appraisal for the risk evaluation model of BOT project bidding program with the method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.