• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 472
  • 164
  • 85
  • 58
  • 38
  • 31
  • 17
  • 17
  • 16
  • 11
  • 6
  • 6
  • 5
  • 5
  • 4
  • Tagged with
  • 1072
  • 150
  • 119
  • 115
  • 102
  • 91
  • 84
  • 84
  • 75
  • 66
  • 64
  • 63
  • 61
  • 56
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

Integrity Matters: Construction and Validation of an Instrument to Assess Ethical Integrity as an Attitudinal Phenomenon

Ingerson, Marc-Charles 01 July 2014 (has links) (PDF)
This research reviews theoretical and operational concepts of integrity. After this review, an alternative theoretical and operational definition of integrity is proposed. This alternative is one that conceives of integrity in terms of high ethical concern and positive ethical consistency among thoughts, feelings, and behavioral intentions, and which conceives of integrity as more attitude-like than trait- or state-like. Utilizing this alternative conceptualization of integrity, a new label was applied (i.e. ethical integrity) and a new psychometric instrument was developed (i.e. the Ethical Integrity Scale). This dissertation reports on the initial development of the Ethical Integrity Scale and two studies aimed at validation of this instrument. Strengths, limitations, and future directions of this approach to integrity research are then discussed.
322

Preserving Trust Across Multiple Sessions in Open Systems

Chan, Fuk-Wing Thomas 13 July 2004 (has links) (PDF)
Trust negotiation, a new authentication paradigm, enables strangers on the Internet to establish trust through the gradual disclosure of digital credentials and access control policies. Previous research in trust negotiation does not address issues in preserving trust across multiple sessions. This thesis discusses issues in preserving trust between parties who were previously considered strangers. It also describes the design and implementation of trust preservation in TrustBuilder, a prototype trust negotiation system. Preserving trust information can reduce the frequency and cost of renegotiation. A scenario is presented that demonstrates that a server supporting trust preservation can recoup the cost of the trust preservation facility when approximately 25% of its requests are from repeat customers. The throughput and response time improve up to approximately 33% as the percentage of repeat customers grows to 100%.
323

Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks

Henshaw, James Presley 01 June 2005 (has links) (PDF)
Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to bypass CTTN's filter. To increase the security of CTTN, this thesis introduces Phishing Warden, a browser-plug-in that filters content before client-side scripts can execute, thereby preventing the scripts from obfuscating data in order to bypass the filter. Phishing Warden negotiates the release of sensitive data through web forms via the AutoFill button. After Phishing Warden determines the web server is trustworthy of the requested information, the sensitive data is automatically inserted into the form, indirectly informing the user that Phishing Warden trusts the server with this information. Besides potentially obfuscating data, scripts in Internet browsers can exploit security vulnerabilities which allow malicious scripts to potentially take over the computer, or deceive the user with a fake toolbar [31]. In addition to preventing data obfuscation by client-side scripts, Phishing Warden also allows a user to customize script control with the push of a button, letting the user decide which websites to trust enough to run scripts. Phishing Warden extends CTTN to remember past sites deemed trustworthy by the user.
324

Trust Broker: A Defense Against Identity Theft From Online Transactions

Edvalson, Michael George 09 December 2005 (has links) (PDF)
The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that safely stores user information and helps the user determine which sites can be trusted with their sensitive information. Also, the repository facilitates the transfer of the user's in- formation. The overall effect of the system is to inspire greater confidence in online participation among users who desire to protect their personal information.
325

Trust Negotiation for Open Database Access Control

Porter, Paul A. 09 May 2006 (has links) (PDF)
Hippocratic databases are designed to protect the privacy of the individuals whose personal information they contain. This thesis presents a model for providing and enforcing access control in an open Hippocratic database system. Previously unknown individuals can gain access to information in the database by authenticating to roles through trust negotiation. Allowing qualified strangers to access the database increases the usefulness of the system without compromising privacy. This thesis presents the design and implementation of two methods for filtering information from database queries. First, we extend a query modification method for use in an open database system. Second, we introduce a novel filtering method that overcomes some limitations of the query modification method. We also provide results showing that the two methods have comparable performance that is suitable for interactive response time with our sample data set.
326

Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies

Leithead, Travis S. 29 August 2005 (has links) (PDF)
This thesis challenges the assumption that policies will "play fair" within trust negotiation. Policies that do not "play fair" contain requirements for authentication that are misleading, irrelevant, and/or incorrect, based on the current transaction context. To detect these unfair policies, trust negotiation ontologies provide the context to determine the relevancy of a given credential set for a particular negotiation. We propose a credential relevancy framework for use in trust negotiation that utilizes ontologies to process the set of all available credentials C and produce a subset of credentials C' relevant to the context of a given negotiation. This credential relevancy framework reveals the credentials inconsistent with the current negotiation and detects potentially malicious policies that request these credentials. It provides a general solution for detecting policies that do not "play fair," such as those used in credential phishing attacks, malformed policies, and malicious strategies. This thesis motivates the need for a credential relevancy framework, outlines considerations for designing and implementing it (including topics that require further research), and analyzes a prototype implementation. The credential relevancy framework prototype, analyzed in this thesis, has the following two properties: first, it incurs less than 10% extra execution time compared to a baseline trust negotiation prototype (e.g., TrustBuilder); second, credential relevance determination does not compromise the desired goals of trust negotiation—transparent and automated authentication in open systems. Current trust negotiation systems integrated with a credential relevancy framework will be enabled to better defend against users that do not always "play fair" by incorporating a credential relevancy framework.
327

Extensible Pre-Authentication in Kerberos

Hellewell, Phillip L. 03 July 2007 (has links) (PDF)
Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provisioning outsiders that is secure, flexible, efficient, scalable, and easy to manage. Kerberos is a secure, industry-standard protocol. Currently, Kerberos operates as a closed system; all users must be specified upfront and managed on an individual basis. This paper presents EPAK (Extensible Pre-Authentication in Kerberos), a framework that enables Kerberos to operate as an open system. Implemented as a Kerberos extension, EPAK enables many authentication schemes to be loosely coupled with Kerberos, without further modification to Kerberos. EPAK provides the mutual benefits of enhancing the flexibility of Kerberos and increasing the viability of alternate authentication systems as they move to the enterprise.
328

Exploring the Applicability of Gamification in Online Booking Negotiation: Design Process and Evaluation / Tillämpningen av Gamification i Online Bokning Förhandling: Designprocess och utvärdering

Pan, Leyang January 2018 (has links)
Negotiation is an essential part of the user journey in online booking experiences, while it is often perceived as non-engaging and stressful because of the great amount of details that need to be taken care of, which would result in frustration and other negative experience. Aiming to increase the user engagement in the booking negotiation process, this study explored the applicability of gamification in an online booking negotiation tool for booking artists, by following the MDA game design framework (mechanics, dynamics, aesthetics) and taking a three-round user-centred iteration. The resulting gamification design was built as hi-fi clickable prototype and was evaluated by 30 participants with both qualitative and quantitative methods, in comparison to a prototype of conventional negotiation tool with the same functionality but without gamified elements. Although limitation existed in the study due to the given resources, the results showed an overall advantageous performance of the gamified version over the conventional version, and therefore indicated a positive influence of gamification upon user engagement, when being applied to an online booking context. The findings from the design iteration as well as the results from the final evaluation provided implications for future studies. / Förhandlingar är en väsentlig del av användarresan i online bokningsupplevelser, medan det ofta uppfattas som oengagerande och stressigt på grund av den stora mängd detaljer som måste tas hand om, vilket leder till frustration och annan negativ upplevelse. Med syftet att öka användarengagemanget i bokningsförhandlingsprocessen undersökte denna studie tillämpningen av gamifieringen i ett online-bokningsförhandlingsverktyg för bokning av artister genom att följa MDA-spelkonstruktionsramen (mekanik, dynamik, estetik) och ta en treårig användarcentrerad iteration. Den resulterande gamifieringsdesignen byggdes som en hi-fi-klickbar prototyp och utvärderades av 30 deltagare med både kvalitativa och kvantitativa metoder i jämförelse med en prototyp av ett konventionellt förhandlingsverktyg med samma funktionalitet men utan gamend-element. Trots att det fanns begränsningar i studien på grund av de givna resurserna, visade resultaten en generellt fördelaktig prestanda av den gamifierade versionen över den konventionella versionen, och indikerade därför ett positivt inflytande av gamifieringen vid användarengagemang när den applicerades i en online-bokningskontext. Resultaten från designteerationen samt resultaten från den slutliga utvärderingen gav indikationer för framtida studier.
329

Division I Female Soccer Players: Development of the Self Across Time and Interactional Groups

Rice, Andrew Alan 09 November 1999 (has links)
This study is intended to explore the interactive effect of various interpersonal groups and longitudinal maturation on the socialization of individuals within a culture. It will deal with conflict resolution and the formation of a transitory sense of self informed by George Herbert Mead's perspective with an emphasis on symbolic interaction. I have chosen as my sample group a division I female college soccer team in the eastern United States . My time as an assistant coach has given me access to the daily lives of these players for a two year period during which I have acted as a participant observer. Although the study is limited to a small group of elite athletes, it is presumed that similar processes are at work each time an individual enters a new social setting or attempts to reconcile conflicting norms between different groups. When such groups collide, the individual is forced to conform to one at the expense of the other(s). This creates what I will call deviant conformity / Master of Science
330

Automated Negotiation for Complex Multi-Agent Resource Allocation

An, Bo 01 February 2011 (has links)
The problem of constructing and analyzing systems of intelligent, autonomous agents is becoming more and more important. These agents may include people, physical robots, virtual humans, software programs acting on behalf of human beings, or sensors. In a large class of multi-agent scenarios, agents may have different capabilities, preferences, objectives, and constraints. Therefore, efficient allocation of resources among multiple agents is often difficult to achieve. Automated negotiation (bargaining) is the most widely used approach for multi-agent resource allocation and it has received increasing attention in the recent years. However, information uncertainty, existence of multiple contracting partners and competitors, agents' incentive to maximize individual utilities, and market dynamics make it difficult to calculate agents' rational equilibrium negotiation strategies and develop successful negotiation agents behaving well in practice. To this end, this thesis is concerned with analyzing agents' rational behavior and developing negotiation strategies for a range of complex negotiation contexts. First, we consider the problem of finding agents' rational strategies in bargaining with incomplete information. We focus on the principal alternating-offers finite horizon bargaining protocol with one-sided uncertainty regarding agents' reserve prices. We provide an algorithm based on the combination of game theoretic analysis and search techniques which finds agents' equilibrium in pure strategies when they exist. Our approach is sound, complete and, in principle, can be applied to other uncertainty settings. Simulation results show that there is at least one pure strategy sequential equilibrium in 99.7% of various scenarios. In addition, agents with equilibrium strategies achieved higher utilities than agents with heuristic strategies. Next, we extend the alternating-offers protocol to handle concurrent negotiations in which each agent has multiple trading opportunities and faces market competition. We provide an algorithm based on backward induction to compute the subgame perfect equilibrium of concurrent negotiation. We observe that agents' bargaining power are affected by the proposing ordering and market competition and for a large subset of the space of the parameters, agents' equilibrium strategies depend on the values of a small number of parameters. We also extend our algorithm to find a pure strategy sequential equilibrium in concurrent negotiations where there is one-sided uncertainty regarding the reserve price of one agent. Third, we present the design and implementation of agents that concurrently negotiate with other entities for acquiring multiple resources. Negotiation agents are designed to adjust 1) the number of tentative agreements and 2) the amount of concession they are willing to make in response to changing market conditions and negotiation situations. In our approach, agents utilize a time-dependent negotiation strategy in which the reserve price of each resource is dynamically determined by 1) the likelihood that negotiation will not be successfully completed, 2) the expected agreement price of the resource, and 3) the expected number of final agreements. The negotiation deadline of each resource is determined by its relative scarcity. Since agents are permitted to decommit from agreements, a buyer may make more than one tentative agreement for each resource and the maximum number of tentative agreements is constrained by the market situation. Experimental results show that our negotiation strategy achieved significantly higher utilities than simpler strategies. Finally, we consider the problem of allocating networked resources in dynamic environment, such as cloud computing platforms, where providers strategically price resources to maximize their utility. While numerous auction-based approaches have been proposed in the literature, our work explores an alternative approach where providers and consumers negotiate resource leasing contracts. We propose a distributed negotiation mechanism where agents negotiate over both a contract price and a decommitment penalty, which allows agents to decommit from contracts at a cost. We compare our approach experimentally, using representative scenarios and workloads, to both combinatorial auctions and the fixed-price model, and show that the negotiation model achieves a higher social welfare.

Page generated in 0.3218 seconds