Sciweavers

791 search results - page 41 / 159
» Users and Trust in Cyberspace
Sort
View
ECRA
2002
165views more  ECRA 2002»
13 years 7 months ago
Effect of trust on customer acceptance of Internet banking
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...
Bomil Suh, Ingoo Han
IWC
2002
79views more  IWC 2002»
13 years 7 months ago
Trust in information sources: seeking information from people, documents, and virtual agents
The notion of trust has been virtually absent from most work on how people assess and choose their information sources. Based on two empirical cases this study shows that software ...
Morten Hertzum, Hans H. K. Andersen, Verner Anders...
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
14 years 26 days ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
13 years 11 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
JASIS
2006
108views more  JASIS 2006»
13 years 7 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...