• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1865
  • 734
  • 240
  • 143
  • 86
  • 76
  • 70
  • 63
  • 61
  • 56
  • 36
  • 24
  • 22
  • 11
  • 10
  • Tagged with
  • 3996
  • 780
  • 602
  • 439
  • 415
  • 400
  • 326
  • 299
  • 297
  • 296
  • 275
  • 261
  • 256
  • 243
  • 232
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
901

How can business partners establish a relationship of trust in order to share Web Services? / Hur kan företags partners skapa en pålitlig relation när Web Services används?

Andersson, Thomas, Arnevill, Anita January 2003 (has links)
Introduction Web Services is a relatively new concept to distributed data systems. It provides a new way for companies to easily integrate with other companies. With UDDI, companies are able to host their services in a wider market and also connect to other companies. However, with business expansion also follows trust issues. In order to share Web Services in a business partner relationship it is necessary to have a relation of trust. Purpose The purpose of this thesis is to investigate about this issue, i.e. how Web Services with the use of UDDI can be made as a “network of trust” and additionally obtain an idea about how the use of these two will look like in the future. The question of trust between partners sharing Web Services is still open. There has therefore been an interest to look at this problem. The aim for this thesis is to find possible solutions that can be used to address the problem. Method To investigate this we chose to do a literature study and continue with a survey consisted by interviews and questionnaires. Interviews were used to find which solutions that are available in reality and the questionnaires provide information about to what extent Web services and the found solutions are used. The questionnaire was done on random Swedish companies and was sent by e-mails. The interviews were done on two global Swedish companies, Volvo and Ericsson. This way information was found and could be compared in how the issue is dealt with in the literature and what is actually done in reality. Conclusion The outcome of the entire investigation is that Web Services today, even though it exists in most companies, is still in testing phase. As for this, the use of UDDI has had little attention and so has the issues regarding trust. The solution we found to the most applicable to create a network of trust is the Liberty Alliance Project. Web Services, UDDI, trust / Web Services är ett relativt nytt concept vad gäller distribuerade system. Det skapar ett nytt sätt att integrera mellan företag. Med UDDI så kan företag registerar sina tjänster på en bredare marknad och kan även ansluta sig till andra tjänster och företag. När dessa tjänster (Web Services) delas i affärspartners syfte så är det nödvändigt att företagen har en pålitlig relation. Problemet är om denna pålitlighet finns i företagen, vilket är utforskat i denna uppsats.
902

Trusted memory acquisition using UEFI

Markanovic, Michel, Persson, Simeon January 2014 (has links)
Context. For computer forensic investigations, the necessity of unmodified data content is of vital essence. The solution presented in this paper is based on a trusted chain of execution, that ensures that only authorized software can run. In the study, the proposed application operates in an UEFI environment where it has a direct access to physical memory, which can be extracted and stored on a secondary storage medium for further analysis. Objectives. The aim is to perform this task while being sheltered from influence from a potentially contaminated operating system. Methods. By identifying key components and establishing the foundation for a trusted environment where the memory imaging tool can, unhindered, operate and produce a reliable result Results. Three distinct states where trust can be determined has been identified and a method for entering and traversing them is presented. Conclusions. Tools that does not follow the trusted model might be subjected to subversion, thus they might be considered inadequate when performing memory extraction for forensic purposes.
903

Consumer Trust in E-Commerce : An Analysis of Means Communicating Trustworthiness from a Buying Transaction Life Cycle Perspective

Schultz, Carsten January 2004 (has links)
Trust is a major challenge to the consumer acceptance of e-commerce: the lack of trust is an important reason for the hesitant growth in e-commerce and for the reluctance of consumers to engage in online buying transaction. Communicating trustworthiness is therefore a major challenge companies encounter. This study concentrates on the various means communicating trustworthiness proposed by researchers. An overview of means is presented according to a buying transaction process life cycle spanning the four phases information, agreement, handling, and postpurchase. Besides enabling the categorization of the various means to develop consumer trust, the four phases in addition illuminate the dynamic aspect of trust development and allow the introduction of a simple measure to determine success in the domain of e-commerce by evaluating the repetitiveness of consumer transacting with the e-vendor. A web site analysis was conducted to evaluate the trust means usage in practice. The findings of the web site analysis indicate three general trends. First, the analyzed web sites hint at an absent exploitation of second and third degree information. Second, the results of the study obtained from the indicators regarding the later phases portray a lack of means usage during the handling and postpurchase phase. Third, the web site analysis points out multiple possibilities for e-vendors to adjust, improve, and implement additional trust means. In general, the discovered trends are an indication for e-vendors to adopt their strategies to employ trust means towards the relevant consumer perspective of the company.
904

An evaluation of subjective logic for trust modelling in information fusion

Martinsson, Håkan January 2005 (has links)
Information fusion is to combine information from a variety of sources, or sensors. When the sources are uncertain or contradicting conflict can arise. To deal with such uncertainty and conflict a trust model can be used. The most common ones in information fusion currently is bayesian theory and Dempster-Shafer theory. Bayesian theory does not explicitly handle ignorance, and thus predetermined values has to be hard coded into the system. This is solved in Dempster-Shafer theory by the introduction of ignorance. Even though Dempster-Shafer theory is widely used in information fusion when there is a need for ignorance to be modelled, there has been serious critique presented towards the theory. Thus this work aims at examining another trust models utility in information fusion namely subjective logic. The examination is executed by studying subjective logic using two scenarios from the literature. The results from the scenarios points to subjective logic being a reasonable approach for modelling trust in information fusion.
905

An evaluation of reputation spreading in mobile ad-hoc networks

Håkansson, Martin January 2004 (has links)
The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivial, since such networks have no fixed infrastructure and therefor centralised security is not applicable. MANETs are also more sensitive to attacks due to their wireless communication channels and their spontaneous nature. All kind of cooperation requires a sense of trust. The opinion about trust in other entities can be used as a mean to dynamically allow for secure cooperation in MANETs, as soft security. And also to counter some of the inherited security problems of MANETs. To use opinions as a security paradigm in MANETs the opinions about other nodes has to be spread as reputation about a node. This reputation spreading can be done through spreading of opinions or the spreading of evidences about a nodes behaviour. In this work evidence and reputation spreading are compared to each other. This comparison shows that they are quite similar from a security point of view but that they differ in scalability.
906

Arab management practices from a trust perspective : the case of international companies in Morocco

El Hakimi, Imane January 2016 (has links)
This research contributes to our understanding of trust in the international business environment, exploring the development of trust, and the influence of culture, structures and hierarchies, and international business communications. The focus is on the management of employees working in foreign-owned, international businesses operating in Morocco. With few notable and very valuable exceptions, there has been very little research exploring the Arab approach to management and even fewer pieces of research focus on the development of trust in this context. A qualitative research approach was employed, as so little is understood about the context and the phenomenon. A total of 30 interviewees from various managerial and organisational levels represented the sample of the study with five participating international companies, from different sectors established in Morocco. Using a content-thematic analysis, the research shows that Moroccan employees prefer working in international companies and their preference is associated to many factors such as the work environment they belong to, the financial and social benefits they receive, career advancement and employees’ development as well as being a part of a defined and organised structure where information is well circulated and communication is encouraged. In this way, this research contributes not only to our understanding of the development of trust in an Arab context but also sheds more light on cultural aspects which was found out in the research that they were interpreted differently such as the case of Hofstede’s uncertainty avoidance dimension. In particular the research suggest that some, non-Arabic researchers, may have misinterpreted certain behaviours in Arab cultures. This leads the research to a final conclusion that clearly shows the importance of considering Arab management as a fourth paradigm to explain managerial practices in the Arab World as suggested by Weir (2008) and better understand their practices (Hutchings and Weir, 2006).
907

A strategizing-as-practice perspective of the 'advice process' of small business owners

Ejiogu, Amanze Rajesh January 2016 (has links)
This study examines the processes of advice seeking by small business owners and employs a Strategy-as-Practice perspective. The analysis of the data from 33 small business owners identified eleven factors that influenced the processes. These included: cost; proximity; technical skills and knowledge; business ties; similarity of goals; business savvy; appropriateness of advice; knowledge of the other; knowledge of the business and its context; personal relationships and trust. The extent of influence of the factors was shaped by the category of the advice provider as indicated by the type of relationship and the type and extent of trust in that relationship. This study makes two major contributions to knowledge. First, it highlights the fact that advice seeking is a practice within the broader practice of strategizing and shows the different roles advice plays in small business owner strategizing. Second, it develops a descriptive framework of the advice seeking practice of small business owners which shows that the small business owner’s practice of advice seeking is a set of open-ended activities which are cognitively ordered and spatially-temporally dispersed. High levels of trust and personal relationships are shown to create an advisory space in which the business owner is willing to be open and vulnerable to the advisor and so enables the advisor to gain knowledge of the business owner and his business which help shape the advice given.
908

Förtroende och risk inför ett online köp : En kvalitativ studie om riskupplevelse

Bhatti, Therese January 2017 (has links)
Problem: The risk of online shopping differs from consumer to consumer. Previous scienceshow that consumers experience a higher risk related to online shopping, compared topurchase in traditional stores. The reason behind this is that there is no possibility to physically inspect the product before the purchase is completed, and most people want to try and feel the clothes before they decide to buy it. Also there is no opportunity to create an opinion about the seller, since there is no physical interaction between the customer and the ecommerce, which creates difficulty in assessing whether it is a reliable seller or not. An actionto reduce the consumers perceived risk is by creating a trustworthy impression. Purpose: The purpose of this study is to investigate consumers perceive risks related buy ingclothes online, and if confidence in the e-commerce affects the risk level. Method: The research method for this study was qualitative, with a deductive approach. Data collection was developed through eight semi- structured interviews, in which participant werechosen from a convenience selection from the Stockholm area. Focusing on individuals between the age of 20- 45. Result: The study found that consumers who purchase clothes more often experience a lower risk related to online shopping, compared to those who do it rarely. The two distinct risks that respondents experienced in online shopping were the risk related to the clothes and the financial transaction. Results also showed that trust towards e-commerce has a decisive impact on the degree of risk, and how confident a consumer feels ahead of buying clothes online. It was found that the most effective trust-creating approach was contently information about the clothes, and several payment options. Additionally the results shows that consumers reduce the perceived risk level of online purchase through viral marketing, which is word-of mouth.
909

Trust Dynamics in Acquisitions: A Case Survey

Stahl, Günter, Larsson, Rikard, Kremershof, Ina, Sitkin, Sim B. 09 1900 (has links) (PDF)
Drawing on the organizational trust literature and research on postmerger integration, the authors develop a model that conceptually synthesizes the antecedents and consequences of trust in acquired organizations. The model proposes that the acquiring and target firms' relationship history, the interfirm distance, and the acquirer's integration approach will affect target firm member trust in the acquiring firm's management. Target firm member trust, in turn, may influence several sociocultural integration outcomes as well as postacquisition performance. The results of a case survey suggest that certain aspects of the relationship history and interfirm distance, such as the firms' collaboration history and preacquisition performance differences, are poor predictors of trust, whereas integration process variables, such as speed of integration, communication quality, and acquirer multiculturalism are major factors infl uencing trust. The implications for postmerger integration research and practice are discussed.
910

Právní povaha trustu (právně-komparativní analýza) / The legal nature of a trust (legal and comparative analysis)

Urban, Ondřej January 2015 (has links)
59 ENGLISH ABSTRACT The purpose of this thesis is an interpretation of English trust law, including historical context and comparative application of the acquired knowledge on the Czech legal institute of "svěřenský fond". A critical assessment of the legal regulations governing "svěřenský fond" is followed by theoretical consideration of its legal nature. The work, except the introduction and conclusion, is divided into four main chapters, with the first chapter dealing with the historical roots of the trust. The reader will become familiar with the Roman fideicomissum, the English legal institute called "use" and its influence on the emergence of the law of equity. She will also learn how use turned into trust and what the economic reasons for such a change were. The second part defines the English trust, describes it and clarifies the three main conditions for its creation under applicable law - the three certainties. Further, it will explain who the settlor, trustee and beneficiary are, along with their rights and obligations. It also focuses on the three main types of trusts. Express trusts, created by an act of the settlor and the resulting and constructive trusts, which are created by decision of the courts. The third chapter concerns itself with the "svěřenský fond", as stipulated by the Czech Civil...

Page generated in 0.0572 seconds