The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Forecasting advice from human advisors is often utilized more than advice from automation. There is little understanding of why “algorithm aversion” occurs, or specific conditions that may exaggerate it. This paper first reviews literature from two fields—interpersonal advice and human–automation trust—that can inform our understanding of the underlying causes of the phenomenon. Then, an experiment...
This paper studies the performance of two different trust models in a vehicular network scenario. Like all networks, messages in Vehicular Ad hoc Networks (VANETs) are prone to malicious tampering. Tampered messages render these networks useless for active safety applications. That is why trust models have been proposed in addition to the available authentication mechanisms. Identifying the most suitable...
Nowadays recommender systems are developed to provide information for users to choose the best things that they want. Recently different collaborative filtering techniques have been successfully employed to provide precise recommendations. However, sparsity problem is still considered as an important remained challenges. Existing CF based recommendation methods generally focus on positive similarities...
As a general approach to gain electronic trust in business-to-consumer e-commerce, the customers select valid brands based on the authenticity of the Web and regulatory mechanisms in order to facilitate purchase decision process. This approach is not suitable for purchase from small companies without brands active in e-commerce. To purchase from these companies, we should follow other e-trust approaches...
Personal health records system (PHRs) is an increasingly popular area in medical activities. It is conceded that PHRs could improve healthcare documentation, increase information access for patients and providers and help patients to better control the expenses of care. Consumers who use PHR could gain more knowledge about their health conditions, inquire more questions, and feel more connected to...
Previous HRI research has established that trust, disclosure, and a sense of companionship lead to positive outcomes. In this study, we extend existing work by exploring behavioral approaches to increasing these three aspects of HRI. We increased the expressivity and vulnerability of a robot and measured the effects on trust, disclosure, and companionship during human-robot interaction. We engaged...
In election systems, there are many opportunities to incorporate forensic techniques and gather forensic evidence that can lead to determining the root cause of an anomaly. Although much has been written about security and forensic techniques in election systems, very little research has focused on measuring the forensic capabilities of election systems and mapping them to potential security safeguards...
Cloud computing is a remarkable improvement in the digital landscape that has changed the way of Information Technology solutions are delivered and how end-users put them to use. The cloud computing environment is growing with numbers of cloud service providers and cloud customers. In this scenario, the main confront for cloud customer is to choose ideal service provider among similar services offered...
In this paper, we investigate possible positive and negative consequences of the Internet of Things (IoT), characterized as the scenario in which computing-like technological devices and people can interact and exchange data without the need for deliberate human-to-human interaction, in social practices involving trust. Without denying the positive consequences of IoT, our interest is to discuss the...
In knowledge representation reification, N-Quads and Named Graph have been introduced to represent context of knowledge, meta-information, provenance or any statements of statement. In this work we propose an attributed predicate RDF as a new alternative model in triple RDF to overcome the problem to represent statements of statement or any additional information of statement. We study that the predicate...
Trust is one of most important factor for selecting suitable trading partner in B2B e-market. There is no such single element on which trust can be measured it is conceptualized in different levels and methods. In this paper we proposed a cognition based trust model to measure trustworthiness of businesses in B2B e-market. This paper reports on design details of our model and empirical validation...
Trust-aware recommender systems are intelligent technology applications that make use of trust information and user personal data in social networks to provide personalized recommendations. Trust clearly elevates accuracy of prediction rating for users; especially, when the user's preferences are insufficient, trustworthy friend or people viewpoints can be confidence referenced. However in previous...
Service-oriented environments comprise a number of interconnected service providers and service consumers and are filled by vast numbers of services of various functionalities with different qualities. Finding the desirable services among others is a major problem for a typical user, who can optimize its performance by utilizing services with good qualities. This problem is sometimes addressed by...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Despite the fact that benefits of adopting cloud computing services and applications have become well known within the communities of information technology, adoption of such technology still facing various challenges. Currently, establishing trust is considered as the main barrier preventing individuals and enterprises adopting cloud solutions. Though, to best of our knowledge it has not been considered...
Trust is difficult to establish in online auctions since transactions occur among complete strangers. The Internet Fraud Complaint Center shows that auction fraud is the highest rate of crime in online activities. Nowadays, shill bidding is the most severe and persistent fraud for online auction users. Considering the strengths and weaknesses of existing works on combating shill bidding in online...
Shin incorporates a probabilistic method for revising trust estimates in trustees, yielding higher prediction accuracy than traditional approaches that base trust exclusively on a series of referrals culminating with the trustee.
Nowadays, with the growing number of storage devices and increasing popularity of digital hand-held devices on the Internet of Things (iThings), performing a digital forensic analysis is becoming gradually more problematic especially on the future generation Internet. One of the common solutions is the creation of computer activity timelines. This paper describes the existing tools and practices of...
In open system, the user nodes and resource nodes are variable, it is tiresome for the system administrator to assign roles for the users, and it is almost impossible to check their priorities to access different kind of resources in the system in which the traditional Role Based Access Control (RBAC) model is adapted. To simplify the access control and standardize security strategy in open system,...
Studies suggest that there are factors that affects citizens' behavioural intention and adoption behaviour towards the use of government e-services. Low patronage of eGovernment has become an issue in developing nations. Therefore, this paper proposes an integration of trust dimensions and risk taken propensity to the UTAUT model. We tested the model on 101 university students in Malaysia. The survey...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.