• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1866
  • 734
  • 240
  • 143
  • 86
  • 76
  • 70
  • 63
  • 61
  • 56
  • 36
  • 24
  • 22
  • 11
  • 10
  • Tagged with
  • 3999
  • 781
  • 602
  • 440
  • 415
  • 400
  • 326
  • 299
  • 297
  • 296
  • 275
  • 261
  • 256
  • 244
  • 232
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

The critical factors influencing citizens' trust in e-government adoption : citizens' aspects perspective

Alzahrani, Latifa January 2017 (has links)
Despite the importance of citizens’ trust toward the successful adoption of e-government, the majority of the extant research focuses only on two dimensions to investigate the role of citizens’ trust in e-government which are, trust in technology and trust in government. Hence, there is an absence of research into the multi-dimensional nature of trust and in particular how demographic aspects such as citizens’ personality, culture, gender, experience, education level, beliefs and value systems influence citizens’ trust in e-government. This research particularly aims to investigate and analyse the critical factors influencing citizens' trust in e-government from different aspects including: technology, government agency, risk and citizens' perspective. To achieve this aim, this research undertook a comprehensive review of the e-government and trust literatures, followed by a systematic review of relevant academic articles to identify the factors influencing trust in e-government. The existing literature considered technical factors, government agencies, risk and citizens' aspects. Thereby, a conceptual framework was developed by extending the updated DeLone and McLean’ IS Success Model. To validate the framework, empirical research was preformed, followed by the distribution of a questionnaire to participants who have a past experience in using e-government services, within three ministries in Saudi Arabia. Of 1076 completed survey responses received, 912 were considered valid to use in this study. This study has applied structural equation modelling (PLS-SEM) to test the proposed research framework using SmartPLS 3.0. The final developed framework was then refined and presented along with the findings regarding the significant factors influencing citizens’ trust in e-government. The findings of study revealed that while technical factors and disposition to trust have a positive influence on trust in e-government, factors related to government agencies and risk have negative impacts on citizens' trust. With regard to the citizens' aspects, the findings reveal that the female respondents demonstrate a more positive evaluation of online services as compared to the male respondents, with the female group reporting more significant and positive influences of the technical aspects on trust in e-government as compared to the male group. Interestingly, this study found that old people display greater trust in e-government as compared to levels of trust reported by younger people. The findings also highlight that internet experience has a positive influence on citizens' trust, as increased levels of Internet experience increased the level of trust in e-government. Finally, the study found non-significant support of the influence of education level in terms of trust in e-government. Lastly, the strategies that governments use to build and develop citizens' trust were identified based on the findings of the study. The originality of this study is that it tries to provide new insights on the subject of citizens’ trust in e-government in Saudi Arabia, as limited studies investigate and analyse how citizens’ differences in gender, age, education level and internet experience can influence their trust in e-government. This study attempts to provide a validated conceptual framework that integrates different antecedents of trust in e-government. Also, the impact of additional factors such as citizens’ satisfaction, intention to continue use e-government and the moderating effect of different demographic factors (gender, age, education and internet experience) are considered in this research, complementing and enhancing the existing literature on trust in e-government. Also, this research offers several implications to practitioners (decision maker) and stakeholders who are involved in e-government initiatives by providing new insights into e-government adoption from a citizens’ perspective.
272

Efeito do comportamento disfuncional sobre a confiança entre decisores utilizando trust game

Souza, Silvânio Batista de 31 January 2012 (has links)
Made available in DSpace on 2016-03-15T19:32:34Z (GMT). No. of bitstreams: 1 Silvanio Batista de Sousa.pdf: 2248146 bytes, checksum: 53eaaddd8845b73159fdf8df908cc1f1 (MD5) Previous issue date: 2012-01-31 / Fundo Mackenzie de Pesquisa / Understanding the relationship between dysfunctional behavior and confidence of managers in management is essential, as these factors may adversely affect the results and performance of businesses and undermine the organizational climate. The objective of this study was to understand the relationship between these two aspects, reliability and dysfunctional behavior. These results demonstrated that the presence of dysfunctional behavior affects the decision confidence of managers in management and was also verified that different than expected in theory the wages received not exerted great influence on the decisions taken by the subjects. A possible cause of this difference between the results obtained and the theory may be that the present study have extended the results of the task of Zhang (2008) from single period to multiple periods creating social ties among individuals, in addition, the test sample belongs to called generation Y, which has different values from those included in the theories and this is an issue that can be studied in future research. Besides worrying about the negative aspects of dysfunctional behavior, companies should be alert to the career expectations of generation Y, who will soon assume positions of leadership, because this generation is concerned with values other than the main salary, as free time , establishing lasting relationships with coworkers and with a good organizational climate. / Compreender a relação entre comportamento disfuncional e a confiança dos gestores na administração da empresa é fundamental, pois estes fatores podem afetar negativamente os resultados e desempenho das empresas e prejudicar o clima organizacional. O objetivo deste estudo foi compreender a relação entre estes dois aspectos, confiança e comportamento disfuncional. Os resultados deste trabalho demonstraram que a presença de comportamento disfuncional afeta a decisão de confiança dos gestores na administração da empresa e também foi possível verificar que diferente do esperado na teoria o salário recebido não exerceu grande influência nas decisões tomadas pelos sujeitos. Uma possível causa deste desvio entre os resultados obtidos e a teoria pode ser o fato da presente pesquisa ter estendido os resultados da tarefa de Zhang (2008) de período único para múltiplos períodos criando laços sociais entre os sujeitos, além disso, a amostra testada pertence a chamada geração Y, que possui valores diferentes dos preconizados nas teorias e este é um assunto que pode ser estudado em futuras pesquisas. Além de se preocuparem com os aspectos negativos do comportamento disfuncional, as empresas devem estar atentas às expectativas de carreira da geração Y, que em breve irá assumir cargos de liderança, pois esta geração está preocupada com outros valores além da remuneração principal, como tempo livre, estabelecimento de relações duradouras com os colegas de trabalho e com um bom clima organizacional.
273

E-trust in startups: on trust, communication and innovation in an e-entrepreneurial context

von Berlepsch, Patrik, Kinberger, Elon January 2021 (has links)
This thesis aims to explore how trust, communication and innovation is potentially interconnected in the context of e-entrepreneurial startups. Trust seems to be an important component to success, but the virtual environment makes the traditional formation of trust difficult. An inductive strategy using qualitative interviews was employed to explore this relatively under researched subject. The findings indicate the most important aspects of trust in this context. Further, the findings imply that some of the constructs for trust present in virtual and temporary teams are also present in this context. Furthermore, there seems to be connections between communication and trust in a startup, both ways. The same seems true for the aspects of the firm's innovation capabilities and trust. Finally, theoretical implications of this research are presented and several interesting topics for future research are suggested. / Denna uppsats ämnar utforska den potentiella relationen mellan tillit, kommunikation och innovation i kontexten av e-entreprenöriella start-ups. Tillit verkar vara en viktig del för att nå framgång, men den virtuella kontexten gör en traditionell tillitsutveckling svår. En induktiv strategi med kvalitativa intervjuer användes för att utforska detta, som är ett relativt underforskat ämne. Resultaten antyder på de viktigaste elementen av tillit i denna kontext. Vidare pekar även studien på att vissa av de konstruktioner för tillit som återfinns i virtuella och tillfälliga teams även återfinns i denna kontext. Det tycks även finnas en tvåvägs koppling mellan kommunikation och tillit samt för beståndsdelarna av innovation capabilities och tillit. Slutligen presenteras implikationer för det teoretiska fältet och flera intressanta ämnen för framtida forskning föreslås.
274

Trust Discounting in the Multi-Arm Trust Game

Collins, Michael 17 December 2020 (has links)
No description available.
275

Building Brand Trust in E-Government among Socially Vulnerable Groups: A CaseStudy on The Swedish Tax Agency

Salkovic, Nejla, Freidenvall, Ebba January 2022 (has links)
The purpose of this thesis is to gain an understanding of how public agencies can increase theirbrand trust by adapting technologies and digital strategies which target inclusiveness forsocially vulnerable groups. To obtain the research purpose, the study explores how the SwedishTax Agency work to adapt its digital tools and the ways in which these digital tools contributeto gaining brand trust. The study was conducted as a qualitative single case study where datawas mainly collected using secondary data of official data published by the Swedish TaxAgency. In addition, employees at Swedish Tax Agency were interviewed, using a semistructured interview as the primary data collection method. The study concludes that there is aneed of both cognitive and affective trust in understanding how agencies can gain brand trustin e-government. They can also be corroborated with both traditional marketing literature andwith more recent literature in e-government.
276

Trust and Knowledge Sharing in Hybrid Project Teams

Larsson, Jennifer, Revland, Sara January 2023 (has links)
The COVID-19 pandemic resulted in a rapid and significant change in the work settings of many organizations. Today, many businesses have adopted a hybrid way of working as opposed to returning to the traditional way. Due to this topic being relatively new, there is little research done within the area. Furthermore, knowledge and, by extension, knowledge sharing are two of the most important resources or procedures for an organization to remain long-term competitive. One major factor influencing knowledge sharing is trust, therefore, this study aims to investigate how knowledge sharing and trust within project teams have been impacted by the hybrid context. Further, four aspects of trust, benevolence, competence, openness, and integrity, will also be studied to see how the hybrid context has influenced them. This master’s thesis is based on a case study with an exploratory approach. Qualitative interviews and literature research were conducted, which together form the basis for the analysis and conclusions. It has become evident that the hybrid context has had an impact on all factors considered, in other words, knowledge sharing, trust, and the aspects of trust. One significant finding was that it appears to be difficult and more time-consuming to establish social relationships in the hybrid context, and this has had a negative impact on all variables examined. Despite the negative consequences, the research findings also show that the hybrid context has some positive impacts in regard to benevolence, openness, and integrity. The findings in this master’s thesis contribute to the research by providing further understanding of how the hybrid context has affected knowledge sharing and trust, including its aspects. Practitioners will get valuable insights into trust and knowledge sharing, both of which are critical to the success of teams and organizations. Further, a set of managerial implications are given.
277

The role of culture in trust levels of leaders

Moodaly, Avintha January 2008 (has links)
South Africa’s unique history has produced an organisational climate where race groups forcibly separated in the past, have to now work together in harmony. Limited interaction between the ethnic groups creates a culturally uninformed society where trust between groups is lacking. The objective of this study was to confirm the levels of collectivism for the different race groups, and to determine the relationship between collectivism, propensity to trust and in group trust. A survey was administered to a Business Unit of a South African petrochemical company. 387 responses were obtained from a sufficiently diverse sample. The results confirmed that blacks and Indians are more collectivistic than whites and coloureds. Collectivistic groups had a lower propensity to trust and higher in group trust. This research creates awareness regarding the different aspects of culture and the behaviours these cultural differences drive. Trust development must be approached with a culturally informed view.
278

Framework for the adoption of online banking

Alsulimani, Tagreed January 2013 (has links)
Information technology represents the most important tool for any business to grow and increase pro_ts in this century. Online banking represents one type of business change due to revolutionary changes in technology. There are limited studies for adoption of online banking in Saudi Arabia which is one of the largest economies in the world. For that reason my study focused on the adoption of online banking by countries in general and particularly in Saudi society. In many situations there is a gap between business and information technology. In particular there is a crimson between online bank users and technology. It is necessary to bridge this gap In order to achieve online banking targets. My study investigated the different reasons for the gap its formation (between online banking and information technology) and how to bridge it. This research is focused on the diferent factors that enhance the adoption of online banking services through general users. This framework was established by drawing from several theoretical studies. The proposed research framework contains the most important factors for online banking. These include the following hypotheses; (H1) personal information, (H2) personal experience, (H3) disposition to trust, (H4) reputation, (H5) trusting Belief, (H6)structural assur- ance and (H7) perceived site quality. These hypotheses were tested experimentally through a questionnaire which was analyzed using SPSS Version 14 program. The results showed that (H1) personal information, (H2) personal experience, (H3) dis- position to trust, (H4) reputation, (H5) trusting belief, (H6) structural assurance and (H7) perceived site quality are positive factors affecting customer adoption of online banking. There was a significant correlation between the different online banking adoption factors or hypotheses and the personal information (age, gender and education) with P values of <0.005 in most of cases.
279

Security and Privacy of Sensitive Data in Cloud Computing

Gholami, Ali January 2016 (has links)
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can easily deploy cloud services. However, the shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise to security and privacy considerations relating to facets of cloud computing such as multi-tenancy, trust, loss of control and accountability. Consequently, cloud platforms that handle sensitive information are required to deploy technical measures and organizational safeguards to avoid data protection breakdowns that might result in enormous and costly damages. Sensitive information in the context of cloud computing encompasses data from a wide range of different areas and domains. Data concerning health is a typical example of the type of sensitive information handled in cloud computing environments, and it is obvious that most individuals will want information related to their health to be secure. Hence, with the growth of cloud computing in recent times, privacy and data protection requirements have been evolving to protect individuals against surveillance and data disclosure. Some examples of such protective legislation are the EU Data Protection Directive (DPD) and the US Health Insurance Portability and Accountability Act (HIPAA), both of which demand privacy preservation for handling personally identifiable information. There have been great efforts to employ a wide range of mechanisms to enhance the privacy of data and to make cloud platforms more secure. Techniques that have been used include: encryption, trusted platform module, secure multi-party computing, homomorphic encryption, anonymization, container and sandboxing technologies. However, it is still an open problem about how to correctly build usable privacy-preserving cloud systems to handle sensitive data securely due to two research challenges. First, existing privacy and data protection legislation demand strong security, transparency and audibility of data usage. Second, lack of familiarity with a broad range of emerging or existing security solutions to build efficient cloud systems. This dissertation focuses on the design and development of several systems and methodologies for handling sensitive data appropriately in cloud computing environments. The key idea behind the proposed solutions is enforcing the privacy requirements mandated by existing legislation that aims to protect the privacy of individuals in cloud-computing platforms. We begin with an overview of the main concepts from cloud computing, followed by identifying the problems that need to be solved for secure data management in cloud environments. It then continues with a description of background material in addition to reviewing existing security and privacy solutions that are being used in the area of cloud computing. Our first main contribution is a new method for modeling threats to privacy in cloud environments which can be used to identify privacy requirements in accordance with data protection legislation. This method is then used to propose a framework that meets the privacy requirements for handling data in the area of genomics. That is, health data concerning the genome (DNA) of individuals. Our second contribution is a system for preserving privacy when publishing sample availability data. This system is noteworthy because it is capable of cross-linking over multiple datasets. The thesis continues by proposing a system called ScaBIA for privacy-preserving brain image analysis in the cloud. The final section of the dissertation describes a new approach for quantifying and minimizing the risk of operating system kernel exploitation, in addition to the development of a system call interposition reference monitor for Lind - a dual sandbox. / “Cloud computing”, eller “molntjänster” som blivit den vanligaste svenska översättningen, har stor potential. Molntjänster kan tillhandahålla exaktden datakraft som efterfrågas, nästan oavsett hur stor den är; dvs. molntjäns-ter möjliggör vad som brukar kallas för “elastic computing”. Effekterna avmolntjänster är revolutionerande inom många områden av datoranvändning.Jämfört med tidigare metoder för databehandling ger molntjänster mångafördelar; exempelvis tillgänglighet av automatiserade verktyg för att monte-ra, ansluta, konfigurera och re-konfigurera virtuella resurser “allt efter behov”(“on-demand”). Molntjänster gör det med andra ord mycket lättare för or-ganisationer att uppfylla sina målsättningar. Men det paradigmskifte, sominförandet av molntjänster innebär, skapar även säkerhetsproblem och förutsätter noggranna integritetsbedömningar. Hur bevaras det ömsesidiga förtro-endet, hur hanteras ansvarsutkrävandet, vid minskade kontrollmöjligheter tillföljd av delad information? Följaktligen behövs molnplattformar som är såkonstruerade att de kan hantera känslig information. Det krävs tekniska ochorganisatoriska hinder för att minimera risken för dataintrång, dataintrångsom kan resultera i enormt kostsamma skador såväl ekonomiskt som policymässigt. Molntjänster kan innehålla känslig information från många olikaområden och domäner. Hälsodata är ett typiskt exempel på sådan information. Det är uppenbart att de flesta människor vill att data relaterade tillderas hälsa ska vara skyddad. Så den ökade användningen av molntjänster påsenare år har medfört att kraven på integritets- och dataskydd har skärptsför att skydda individer mot övervakning och dataintrång. Exempel på skyd-dande lagstiftning är “EU Data Protection Directive” (DPD) och “US HealthInsurance Portability and Accountability Act” (HIPAA), vilka båda kräverskydd av privatlivet och bevarandet av integritet vid hantering av informa-tion som kan identifiera individer. Det har gjorts stora insatser för att utvecklafler mekanismer för att öka dataintegriteten och därmed göra molntjänsternasäkrare. Exempel på detta är; kryptering, “trusted platform modules”, säker“multi-party computing”, homomorfisk kryptering, anonymisering, container-och “sandlåde”-tekniker.Men hur man korrekt ska skapa användbara, integritetsbevarande moln-tjänster för helt säker behandling av känsliga data är fortfarande i väsentligaavseenden ett olöst problem på grund av två stora forskningsutmaningar. Fördet första: Existerande integritets- och dataskydds-lagar kräver transparensoch noggrann granskning av dataanvändningen. För det andra: Bristande kän-nedom om en rad kommande och redan existerande säkerhetslösningar för att skapa effektiva molntjänster.Denna avhandling fokuserar på utformning och utveckling av system ochmetoder för att hantera känsliga data i molntjänster på lämpligaste sätt.Målet med de framlagda lösningarna är att svara de integritetskrav som ställsi redan gällande lagstiftning, som har som uttalad målsättning att skyddaindividers integritet vid användning av molntjänster.Vi börjar med att ge en överblick av de viktigaste begreppen i molntjäns-ter, för att därefter identifiera problem som behöver lösas för säker databe-handling vid användning av molntjänster. Avhandlingen fortsätter sedan med en beskrivning av bakgrundsmaterial och en sammanfattning av befintligasäkerhets- och integritets-lösningar inom molntjänster.Vårt främsta bidrag är en ny metod för att simulera integritetshot vidanvändning av molntjänster, en metod som kan användas till att identifierade integritetskrav som överensstämmer med gällande dataskyddslagar. Vårmetod används sedan för att föreslå ett ramverk som möter de integritetskravsom ställs för att hantera data inom området “genomik”. Genomik handlari korthet om hälsodata avseende arvsmassan (DNA) hos enskilda individer.Vårt andra större bidrag är ett system för att bevara integriteten vid publice-ring av biologiska provdata. Systemet har fördelen att kunna sammankopplaflera olika uppsättningar med data. Avhandlingen fortsätter med att före-slå och beskriva ett system kallat ScaBIA, ett integritetsbevarande systemför hjärnbildsanalyser processade via molntjänster. Avhandlingens avslutan-de kapitel beskriver ett nytt sätt för kvantifiering och minimering av risk vid“kernel exploitation” (“utnyttjande av kärnan”). Denna nya ansats är ävenett bidrag till utvecklingen av ett nytt system för (Call interposition referencemonitor for Lind - the dual layer sandbox). / <p>QC 20160516</p>
280

Den Moraliska Kompassen – En guide till marknadsföring av välgörenhet / The Moral Compass - A Guide to Marketing of Charity

Albertsson, Linn, Ljung, Emelie January 2016 (has links)
Bakgrund: Tidigare studier visar en ökad misstro till välgörenhetsorganisationer samtidigt som det ökade antalet organisationer ökar konkurrensen mellan organisationerna om bidragsgivarnas donationer. Detta ställer krav på välgörenhetsorganisationer att marknadsföra sig för att nå ut till allmänheten. Eftersom organisationerna till stor del är beroende av allmänhetens förtroende för att finansiera sin verksamhet är den ökade misstron oroväckande. Vi ställer oss därför frågan: Kan det nya intresset för marknadsföring inom branschen användas för att vinna tillbaka allmänhetens förtroende och därmed minska risken för uteblivna donationer?Syfte: Syftet med studien var att studera vilka faktorer som påverkar allmänhetens förtroende för välgörenhetsorganisationer. Detta ska sedan ligga till grund för en analys av hur marknadsföringsinsatser för välgörenhetsorganisationer kan bidra till ett ökat förtroende hos allmänheten.Metod: En kvalitativ insamlingsmetod användes där 21 respondenter deltog i fyra olika fokusgrupper. Respondenterna delades upp efter nivå av engagemang inom välgörenhet som på så sätt skulle kunna representera olika målgrupper. Empirin har sedan analyserats med hjälp av innehållsanalys.Resultat: De mest framträdande faktorerna som påverkade respondenternas förtroende var transparens, tydlighet i vad varje bidrag får för positiva konsekvenser, handlingar hos representerande för organisationen och personliga rekommendationer. Utöver detta så var det även viktigt att marknadsföringen var effektiv men inte framstod som alltför kostsam. Vidare visade sig en del skillnader mellan respondenter med högt och lågt engagemang avseende hur viktiga de olika faktorerna var för respektive målgrupp, vilket skulle kunna påverka hur organisationerna väljer att utforma sin marknadsföring.Slutsats: Välgörenhetsorganisationer kan påverka allmänhetens förtroende genom att anpassa sin marknadsföring för att visa transparens och tydlighet i vad varje bidrag ger för positiva konsekvenser. Marknadsföring i form av representanter för organisationer och word-of-mouth hade även stor påverkan, framförallt på de som är mindre engagerade inom välgörenhet. Utformning och medieval kan med fördel anpassas utefter målgrupp, beroende på mottagarens befintliga engagemang inom välgörenhet. / Background: Previous studies have shown an increase in distrust for charities. At the same time the competition has grown among the different charity organizations and has affected the amount of donations given to each individual charity. This has created an advanced requirement on marketing strategies within the industry. Due to the charities reliability on public donations it is concerning when the distrust has increased over the past years. We ask ourselves: can the interest for new marketing strategies be of service to charities, in enabling them to win the public's trust and therefore decrease the possibility for left out donations?Purpose: The purpose of this study was to examine the different aspects that affect the public's trust toward charity organizations. This will then be our base for analyzing how marketing strategies for charities can contribute to an increased trust.Method: A qualitative research method was used where 21 respondents participated in four focus groups. Respondents were divided into groups by level of commitment to charities and represented different target groups. The empirical data was then analyzed using a content analysis.Results: The most common factors that affected the participants trust for charities was transparency, clarity on the positive effect of the donations, the image that was reflected by organization representatives and personal recommendations. Apart from this it was important that the marketing was effective but under the circumstances of not being projected as too expensive. There was also a difference between the high and low commitment levels which could affect how the charities choose to design their marketing.Conclusion: Charities have the possibility of affecting the public's trust for charities through adjusting their marketing to show transparency of the organization and specifically showing the positive consequences of the donations made. The charities image and personal recommendations effected the delegate’s perception, especially the lower committed groups were affected by this. The marketing channels can be adjusted to fit the target groups, in relation to their commitment to charities.This paper is written in Swedish.

Page generated in 0.0648 seconds