931,873 research outputs found
A Classification Model for Sensing Human Trust in Machines Using EEG and GSR
Today, intelligent machines \emph{interact and collaborate} with humans in a
way that demands a greater level of trust between human and machine. A first
step towards building intelligent machines that are capable of building and
maintaining trust with humans is the design of a sensor that will enable
machines to estimate human trust level in real-time. In this paper, two
approaches for developing classifier-based empirical trust sensor models are
presented that specifically use electroencephalography (EEG) and galvanic skin
response (GSR) measurements. Human subject data collected from 45 participants
is used for feature extraction, feature selection, classifier training, and
model validation. The first approach considers a general set of
psychophysiological features across all participants as the input variables and
trains a classifier-based model for each participant, resulting in a trust
sensor model based on the general feature set (i.e., a "general trust sensor
model"). The second approach considers a customized feature set for each
individual and trains a classifier-based model using that feature set,
resulting in improved mean accuracy but at the expense of an increase in
training time. This work represents the first use of real-time
psychophysiological measurements for the development of a human trust sensor.
Implications of the work, in the context of trust management algorithm design
for intelligent machines, are also discussed.Comment: 20 page
Trust Management Model for Cloud Computing Environment
Software as a service or (SaaS) is a new software development and deployment
paradigm over the cloud and offers Information Technology services dynamically
as "on-demand" basis over the internet. Trust is one of the fundamental
security concepts on storing and delivering such services. In general, trust
factors are integrated into such existent security frameworks in order to add a
security level to entities collaborations through the trust relationship.
However, deploying trust factor in the secured cloud environment are more
complex engineering task due to the existence of heterogeneous types of service
providers and consumers. In this paper, a formal trust management model has
been introduced to manage the trust and its properties for SaaS in cloud
computing environment. The model is capable to represent the direct trust,
recommended trust, reputation etc. formally. For the analysis of the trust
properties in the cloud environment, the proposed approach estimates the trust
value and uncertainty of each peer by computing decay function, number of
positive interactions, reputation factor and satisfaction level for the
collected information.Comment: 5 Pages, 2 Figures, Conferenc
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Trust Management (TM) systems for authentication are vital to the security of
online interactions, which are ubiquitous in our everyday lives. Various
systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage
trust in this setting. In recent years, blockchain technology has been
introduced as a panacea to our security problems, including that of
authentication, without sufficient reasoning, as to its merits.In this work, we
investigate the merits of using open distributed ledgers (ODLs), such as the
one implemented by blockchain technology, for securing TM systems for
authentication. We formally model such systems, and explore how blockchain can
help mitigate attacks against them. After formal argumentation, we conclude
that in the context of Trust Management for authentication, blockchain
technology, and ODLs in general, can offer considerable advantages compared to
previous approaches. Our analysis is, to the best of our knowledge, the first
to formally model and argue about the security of TM systems for
authentication, based on blockchain technology. To achieve this result, we
first provide an abstract model for TM systems for authentication. Then, we
show how this model can be conceptually encoded in a blockchain, by expressing
it as a series of state transitions. As a next step, we examine five prevalent
attacks on TM systems, and provide evidence that blockchain-based solutions can
be beneficial to the security of such systems, by mitigating, or completely
negating such attacks.Comment: A version of this paper was published in IEEE Trustcom.
http://ieeexplore.ieee.org/document/8029486
ENHANCEMENT OF VIRTUAL TEAMS THROUGH SOFTWARE SELECTION: A PROPOSAL
The concept of virtual team gains importance in world economy as the process of globalization advances. This article presents the virtual team as a drive force through the improvement of the collaborative work processes. Substantial features are presented here, in regard to the assembly of the virtual team, the stages of its development and an empirical contrast analysis against the traditional team. In the virtual environment, an emphasis is set on trust, management and planning. These three objectives can be mainly acquired through communication and an accurate representation of the information. In an attempt to estimate the general software necessities required by a virtual team, a model is created that reunites a series of applications considered optimal for telework.Virtual team, software solutions, telework, project management
South African General Equity Unit Trust Funds:Fund Performance and Characteristics
We evaluate performance of general equity unit trust funds in South Africa during the period 2010 to 2017 and identify, if any, characteristics of these unit trust funds that are drivers of this performance. Performance is measured using Jensen’s Alpha with a sample that has not suffered from the full effects of survivorship bias as many other South African research studies have in past years. We used a Weighted Least Squares regression model, after weighting each funds Jensen’s alpha, to determine what characteristics impact the performance of unit trust funds. Our results showed that Beta, Fund Age, Percentage of Top 10 Holdings and Management Fees were all significant in explaining unit trust performance. We found that in the South African general equity unit trust space, funds which take higher risk relative to the market will experience higher levels of performance, younger funds tended to outperform their older counterparts and funds that charge lower management fees will outperform those with higher fees. Funds that on average throughout the period held less Top 10 JSE listed equity stocks tended to outperform those having a larger Top 10 holding exposure. We have thus been able to uncover material performance characteristics that differentiate South African unit trust performance. We have also provided meaningful parameters for investors and investment managers when structuring diversified portfolios, allowing them to improve their ability to provide outperformance consistently over time
On the influence of trust in predicting rural land owner cooperation with natural resource management institutions
Contemporary natural resource management (NRM) emphasizes the role of the public in general and land owners in particular as voluntary participants in the process. Understanding the role of trust in voluntary cooperation is therefore critical, but the current state of the relevant literature is such that it fails to systematically address a few important issues. This inquiry sought to address these issues by presenting and testing a model of land owners’ trust in and cooperation with a NRM institution. The model hypothesizes that the six major drivers of trust in this context (dispositional trust, care, competence, confidence, procedural fairness and salient values similarity) are distinct but correlated constructs that drive cooperation and whose effects are moderated by the sophistication (relevant knowledge and experience) of the trustor. The results provide complicated partial support for the hypotheses and suggest that (1) although the six constructs are separable, their effects on cooperation are not as distinct as expected; (2) the most important consideration for cooperation may, in fact, be a broader evaluation – potentially a willingness to be vulnerable to the target and (3) if sophistication is an important moderator of the effect of trust, it is likely to require only a low level of general sophistication about the target institution to encourage trustors to rely most strongly on their perceptions of the institution itself
Relationship orientation : towards an antecedent model of trust in marketing relationships
With the advent and the increasing use of the concept of Relationship Marketing as a basis for marketing strategy, it has become evident that a lack of empirical knowledge exists as to the operational basis of the concept. Information regarding the conceptual basis of Relationship Marketing and a possible new orientation toward the concept may be of substantial value to both practitioners and scholars of relationship marketing. This paper considers the emergence of a Relationship Orientation within the marketing literature and proposes an antecedent model of Trust as a basis. The role of Ethics as a possible antecedent to Trust is emphasised and identified as a gap within the relationship marketing literature. Based on previous exploratory work and a review of the literature of relationship marketing, exchange theory, general marketing theory, marketing ethics and sales management, four key antecedent dimensions of Trust are identified: Ethics, Bonding, Empathy and Reciprocity. Additional possible antecedents are suggested. Future empirical research is proposed in order to validate the model.<br /
The cat's cradle network
In this paper we will argue that the representation of context in knowledge management is appropriately served by the representation of the knowledge networks in an historicised form. Characterising context as essentially extra to any particular knowledge representation, we argue that another dimension to these be modelled, rather than simply elaborating a form in its own terms. We present the formalism of the cat's cradle network, and show how it can be represented by an extension of the Pathfinder associative network that includes this temporal dimension, and allows evolutions of understandings to be traced. Grounding its semantics in communities of practice ensures utility and cohesiveness, which is lost when mere externalities of a representation are communicated in fully fledged forms. The scheme is general and subsumes other formalisms for knowledge representation. The cat's cradle network enables us to model such community-based social constructs as pattern languages, shared memory and patterns of trust and reliance, by placing their establishment in a structure that shows their essential temporality
Continuous trust management frameworks : concept, design and characteristics
PhD ThesisA Trust Management Framework is a collection of technical components and governing
rules and contracts to establish secure, confidential, and Trustworthy transactions
among the Trust Stakeholders whether they are Users, Service Providers, or Legal
Authorities. Despite the presence of many Trust Frameworks projects, they still fail
at presenting a mature Framework that can be Trusted by all its Stakeholders. Particularly
speaking, most of the current research focus on the Security aspects that may
satisfy some Stakeholders but ignore other vital Trust Properties like Privacy, Legal
Authority Enforcement, Practicality, and Customizability. This thesis is all about
understanding and utilising the state of the art technologies of Trust Management to
come up with a Trust Management Framework that could be Trusted by all its Stakeholders
by providing a Continuous Data Control where the exchanged data would be
handled in a Trustworthy manner before and after the data release from one party to
another. For that we call it: Continuous Trust Management Framework.
In this thesis, we present a literature survey where we illustrate the general picture
of the current research main categorise as well as the main Trust Stakeholders, Trust
Challenges, and Trust Requirements. We picked few samples representing each of
the main categorise in the literature of Trust Management Frameworks for detailed
comparison to understand the strengths and weaknesses of those categorise. Showing
that the current Trust Management Frameworks are focusing on fulfilling most of the
Trust Attributes needed by the Trust Stakeholders except for the Continuous Data
Control Attribute, we argued for the vitality of our proposed generic design of the
Continuous Trust Management Framework.
To demonstrate our Design practicality, we present a prototype implementing its
basic Stakeholders like the Users, Service Providers, Identity Provider, and Auditor
on top of the OpenID Connect protocol. The sample use-case of our prototype is to
protect the Users’ email addresses. That is, Users would ask for their emails not to be
iii
shared with third parties but some Providers would act maliciously and share these
emails with third parties who would, in turn, send spam emails to the victim Users.
While the prototype Auditor would be able to protect and track data before their
release to the Service Providers, it would not be able to enforce the data access policy
after release. We later generalise our sample use-case to cover various Mass Active
Attacks on Users’ Credentials like, for example, using stolen credit cards or illegally
impersonating third-party identity.
To protect the Users’ Credentials after release, we introduce a set of theories and
building blocks to aid our Continuous Trust Framework’s Auditor that would act as
the Trust Enforcement point. These theories rely primarily on analysing the data
logs recorded by our prototype prior to releasing the data. To test our theories, we
present a Simulation Model of the Auditor to optimise its parameters. During some
of our Simulation Stages, we assumed the availability of a Data Governance Unit,
DGU, that would provide hardware roots of Trust. This DGU is to be installed in the
Service Providers’ server-side to govern how they handle the Users’ data. The final
simulation results include a set of different Defensive Strategies’ Flavours that could
be utilized by the Auditor depending on the environment where it operates.
This thesis concludes with the fact that utilising Hard Trust Measures such as DGU
without effective Defensive Strategies may not provide the ultimate Trust solution.
That is especially true at the bootstrapping phase where Service Providers would be
reluctant to adopt a restrictive technology like our proposed DGU. Nevertheless, even
in the absence of the DGU technology now, deploying the developed Defensive Strategies’
Flavours that do not rely on DGU would still provide significant improvements
in terms of enforcing Trust even after data release compared to the currently widely
deployed Strategy: doing nothing!Public Authority for Applied Education and Training in Kuwait, PAAET
Shared water resources in decentralized city regions:mixed governance arrangements in Indonesia
This paper investigates emerging models of governance for shared water resources in decentralized urban regions in Indonesia and draws on a case of inter-local government collaboration for shared water resources in Cirebon region, Indonesia. The paper points to cooperation practice involving a mixed-model of governance for sharing water. by identifying a series of requirements for mixed governance. This model suits well not only because of the regional nature of water resource management in general, but also because such a model is likely to strengthen trust, increase transparency, and provide more equal positions among regions or stakeholders involved. Crucially, this model tends to decrease problematic levels of local autonomy and inter-local rivalry, which currently appears as a major challenge for shared water resource cooperation attempts in the decentralizing contexts of Indonesia and beyond
- …