Detecting unfair recommendations in trust-based pervasive environments

G D'Angelo, F Palmieri, S Rampone - Information Sciences, 2019 - Elsevier
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …

Building Confidence In A World of Eroding Trust

JWZ Lim, VLL Thing - Digital Government: Research and Practice, 2024 - dl.acm.org
Trust is an important pillar in digital transformation. It is the key to fostering effective
communications and collaborations. It is the foundational element that exists in the …

The enterprise management system: evaluating the use of information technology and information systems

VV Borisova, OV Demkina, AV Mikhailova… - Polish Journal of …, 2019 - yadda.icm.edu.pl
The purpose of this study is to complement the existing approaches towards the evaluation
of the quality of ITS use in enterprise management. This article explores the point of using …

Trust-driven, decentralized data access control for open network of autonomous data providers

Ł Opioła, Ł Dutka, RG Słota… - 2018 16th Annual …, 2018 - ieeexplore.ieee.org
The observation of current trends in data access, especially in the field of scientific
computations, shows that global data access that crosses federation boundaries is highly …

What are the influencing factors of government's trust decision-making on private sector in PPP projects: evidence from China?

H Li, C Xu, Y Cao, C Zhang - Journal of Engineering, Design and …, 2024 - emerald.com
Purpose The purpose of this paper is twofold: first, it explores the influencing factors of the
government's trust decision-making in the private sector; second, it explores how these …

Building trustable remote monitoring and management systems

M Morshedi, J Noll, R Kari - 2018 IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging technology that expands wireless and mobile
networks into heterogeneous network of connected devices. Trustable remote monitoring …

Knowledge Reuse as a Foundation for Security Metrics

N Mansourzadeh - 2024 - repository.library.carleton.ca
The recurring question within the cybersecurity landscape is---why do systems keep getting
successfully attacked? This relative ease of system breaches necessitates a reevaluation of …

Zero Trust in the Context of the Utility Industry

N Kumar, N LaRoy - Proceedings of the Future Technologies Conference …, 2021 - Springer
Zero Trust is an evolving paradigm in modern information security. A number of drivers have
led to the need for operation of systems in an environment where networks and endpoints …

[PDF][PDF] DEVELOPMENT OF TRUST MODEL FOR PROXY MARKETERS ENGAGED IN E-COMMERCE PLATFORMS

IE Eyibo, S Ozuomba, BUA Stephen - European Journal of …, 2018 - researchgate.net
ABSTRACT A trust model/mechanism for proxy marketer-based e-commerce system was
developed in this work. The system comprised of two modules, the shopping module which …

Recommendation-based Security Model for Ubiquitous system using Deep learning Technique

J Agarkhed, G Pawar - 2022 6th International Conference on …, 2022 - ieeexplore.ieee.org
Ubiquitous environment embedded with artificial intelligent consist of heterogenous smart
devices communicating each other in several context for the computation of requirements. In …