Sciweavers

2821 search results - page 34 / 565
» To Trust or Not to Trust
Sort
View
JCP
2007
121views more  JCP 2007»
13 years 7 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
ISF
2008
104views more  ISF 2008»
13 years 7 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
CHI
2003
ACM
14 years 8 months ago
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Designing for trust in technology-mediated interaction is an increasing concern in CHI. In advertising, images of people have long been used to create positive attitudes to produc...
Jens Riegelsberger, Martina Angela Sasse, John D. ...
ITRUST
2005
Springer
14 years 1 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone