The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this fast growing world, rapid alterations in technologies result in having a huge influence on humans' standard of living, increase global opportunities and globalize shareholders' activities. Executives all over the world are expected to utilize the right technology in order to gain the high level of success for their organizations. These executives require sustainable knowledge, techniques and...
Effective decision-making within teams and organizations require members to quickly identify, process, and share information with each other. Trust has received significant attention as a key concept to improve performance of information sharing tasks and teams. In this paper, we study the impact of a composite trust based agent model on information sharing in organizations. Our proposed composite...
In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use...
Cloud computing is an emerging computing paradigm which allows sharing of massive, heterogeneous, elastic resources among users. Despite of all the hype surrounding the cloud, users are still reluctant to adopt cloud computing because public cloud services process users' data on machines that users do not own hence there is a fear of leakage of users' commercially sensitive data. Due to these reasons,...
This paper analyzes the survey result on the information security requirement for smart grid. The survey was conducted via distributing questionnaires. Descriptive analysis has successfully ranked the information security consumer requirements with the compass of mean and standard deviation. Privacy concern becomes the most important element among the other fifteen requirements. Result showed that...
To increase human trust in robots, we have developed a system that provides insight into robotic behaviors by enabling a robot to answer questions people pose about its actions (e.g., Q: “Why did you turn left there?” A: “I detected a person at the end of the hallway.”). Our focus is on generation of this explanation in human-understandable terms despite the mathematical, robot-specific representation...
In all human-robot interaction, trust is an important element to consider because the presence or absence of trust certainly impacts the ultimate outcome of that interaction. Limited research exists that delineates the development and maintenance of this trust in various operational contexts. Our own prior research has investigated theoretical and empirically supported antecedents of human-robot trust...
One of the major challenges facing neurophysiological HCI design is to determine the systems and sensors that accurately and noninvasively measure human cognitive processes. Specifically, it is a significant undertaking to integrate sensors and measurements into an information system and accurately measure and interpret the human state. Using an experimental design this study explores the use of unobtrusive...
This paper describes an attempt to explore possible interrelations between today's online communities, trust and their online social patterns. It reports on a study in progress to provide a deeper understanding of how and at what level such relations affect the development of learning social contexts, i.e contexts that represent individuals needs, group commitments, their responsibilities, goals and...
This paper presents an attempt to provide un understand of the possible trust influence in the successful development of online communities. This was achieved by implementing a research framework who aims to understand what is trust and it role in the online learning communities development and how does that interrelations is related with learners' activity and participation patterns. This research...
Reputation is an important aspect of trust. If no direct trust experiences are available, one needs to rely on reputation data from other sources. In this paper we present the Neighbor-Trust metric that exploits these communication capabilities of a network by directly asking all neighbors of a target communication partner for reputation trust data. This results in a reputation path of length one,...
We explore deception in the context of a multi-player robotic game. The robot does not participate as a competitor, but is in charge of declaring who wins or loses every round. The robot was designed to deceive game players by imperceptibly balancing how much they won, with the hope this behavior would make them play longer and with more interest. Inducing false belief about who wins the game was...
This paper has constructed a measure model of macro social capital including three dimensions: network, trust, and institutions. Based on panel data of 23 provinces during 1997–2007 in China, this paper has empirically examined the influences of human capital and social capital on economic growth. We divide our sample into two groups according to the economic prosperity, and analyze the disparities...
This study aimed to examine the influence of mentor's cognition trust to the system satisfaction and the degree of knowledge transfer with the implementation of e-mentoring system. The samples of the study are the financial & insurance company's managers (mainly male) and they are the mentor role. 30 valid questionnaires were completed (effective rate 70%). The research found that an official...
Robotic systems are being introduced into military echelons to extend warfighter capabilities in complex, dynamic environments. While these systems are designed to complement human capabilities (e.g., aiding in battlefield situation awareness and decision making, etc), they are often misused or disused because the user does not have an appropriate level of trust in his or her robotic counterpart(s)...
It is becoming important to establish methodologies to reduce the possibility of human over-trust in automation. However, there are confusions on the notion of “over-trust.” Even though there are lots of researches on model of human trust in automation, the relationship between trust and over-trust has been hardly discussed. This paper proposes a model of trust in automation which can be utilized...
In this paper, we present an approach for high stake decision making based on the processing of uncontrolled knowledge originated from e-communities. Knowledge bases fed by such communities can provide a very rich source for a diagnosis or decision-support systems. However, they inherently bear inherent problems due in particular to knowledge heterogeneity, vagueness, completeness, uncertainty, and...
In the past, many researches have examined and addressed the notion of trust multidimensional in concepts within the areas of e-commerce ranging from business to business (B2B), business to consumer (B2C) and consumer to consumer (C2C). Indeed, the element of trust is vital in ensuring the success of e-commerce. However, the web evolution has moved the interpersonal and inter-organizational transactions...
Trust and Belief are two very closely connected notions. Hence one would expect that any mechanism that guides the management of one can efficaciously guide the other. In fact, devices such as Dempster-Shafer's theory of evidence have been successfully used in the management of both. This paper looks at a different mechanism devised for inductive inferencing, namely Spohn's Ordinal Conditional Functions,...
The cloud services are on everybody's lips, but what is the standpoint of those needing to consider the implications of serious involvement? What trust related aspects the experts deem noteworthy when surrending organisation'scomputing services into foreign hands? In this paper we present results from an expert interview study on trust and cloud services, covering the nature, measurement and experiencing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.