摘要 :
There are two general theories of trust in risk management. One, derived from normative considerations, claims that trust is based on universally applicable factors such as fairness and objectivity. According to the second, social...
展开
There are two general theories of trust in risk management. One, derived from normative considerations, claims that trust is based on universally applicable factors such as fairness and objectivity. According to the second, social-psychological theory, trust is based on agreement or similarity and is context specific. Although the first theory is normative, it also claims, along with the second, to be a descriptive account of how trust judgments are made. The present study was designed to test the adequacy of these two theories by using a think-aloud procedure to examine the thinking associated with trust judgments in an experimental simulation of a typical risk management context. Contrary to the universalist theory, results supported two hypotheses derived from the social-psychological theory. First, study participants―who read brief policy statements designed to address global climate change―based their trust judgments on specific forms of agreement, ranging from agreement on the importance of the issue to agreement on values inferred from the policy statement. Second, the extent and depth of participants' conscious information processing was negatively related to the level of trust. Disagreement and distrust generated more conscious consideration than agreement and trust. These results provide a more detailed understanding than previously available of how trust in risk management is based on local forms of agreement that vary across people, contexts, and time.
收起
摘要 :
Decentralized trust management is used as a referral benchmark for assisting decision making by human or intelligence machines in open collaborative systems. During any given period of time, each participant may only interact with...
展开
Decentralized trust management is used as a referral benchmark for assisting decision making by human or intelligence machines in open collaborative systems. During any given period of time, each participant may only interact with a few other participants. Simply relying on direct trust may frequently resort to random team formation. Thus, trust aggregation becomes critical. It can leverage decentralized trust management to learn about indirect trust of every participant based on past transaction experiences. This article presents alternative designs of decentralized trust management and their efficiency and robustness from three perspectives. First, we study the risk factors and adverse effects of six common threat models. Second, we review the representative trust aggregation models and trust metrics. Third, we present an in-depth analysis and comparison of these reference trust aggregation methods with respect to effectiveness and robustness. We show our comparative study results through formal analysis and experimental evaluation. This comprehensive study advances the understanding of adverse effects of present and future threats and the robustness of different trust metrics. It may also serve as a guideline for research and development of next-generation trust aggregation algorithms and services in the anticipation of risk factors and mischievous threats.
收起
摘要 :
This review of studies of trust in risk management was designed, in part, to examine the relations between the reviewed research and the consensus model of trust that has recently emerged in other fields of study. The review begin...
展开
This review of studies of trust in risk management was designed, in part, to examine the relations between the reviewed research and the consensus model of trust that has recently emerged in other fields of study. The review begins by briefly elaborating the consensus views on the dimensionality and function of trust. It then describes the various models of trust that have been developed in the field of risk management, comparing them with the consensus approach. The findings of previous reviews are outlined, followed by a delineation of the open questions addressed by the present review, the method used, and the results. Finally, the findings of the review are discussed in relation to the important issue of trust asymmetry, the role of trust in risk management, and directions for future research. The consensus model specifies two conceptualizations of trust, each linked to particular types of antecedents. Relational trust, which is called trust in this review, is based on the relations between the trusting person and the other. Calculative trust, which is called confidence, is based on past behavior of the other and/or on constraints on future behavior. Results of this review showed that most studies of trust in risk management, while exploring matters of particular concern to the risk management community, were at least in part consistent with the consensus model. The review concludes by urging greater integration between the concerns of the former and the insights of the latter.
收起
摘要 :
Purpose - The purpose of this paper is to develop a value-based framework for the consumer e-trust building process. Design/methodology/approach - The data collection procedure consisted of two steps. The first was a brief questio...
展开
Purpose - The purpose of this paper is to develop a value-based framework for the consumer e-trust building process. Design/methodology/approach - The data collection procedure consisted of two steps. The first was a brief questionnaire measuring potential informants' personal values. From this pool of potential informants, 30 were recruited for the interviews: five security- and five excitement-minded consumers from three fields of electronic commerce; electronic newspapers, electronic grocery shopping, and electronic healthcare services. Findings - The findings of the study reveal two value-based external factors in e-trust building that consumers perceive as risks in e-commerce, and three value-based behavioral patterns in e-trust building that informants adopt to reduce perceived risks and build trust in e-commerce. Furthermore, findings of the current study suggest that e-trust building process is different based on individuals' personal values. Research limitations/implications - This study takes into account only two consumers' personal values, security and excitement, and ignores others. However, it identifies the role of the consumers' personal values in e-trust building, and thus opens new perspectives for further e-trust research. The study also identifies different strategies that consumers can use to build trust in e-commerce. Originality/value - This study opens new perspectives in e-trust research by exploring the role of consumers' personal values in e-trust building process. The study also provides new insights for other researchers to develop understanding on mechanisms that consumers use to build e-trust.
收起
摘要 :
Purpose - To provide decision makers in strategic alliances a risk-time framework to: categorize types of potential deceitful behaviors by partners; and adopt appropriate deterrence mechanisms to curb and control such behavior. De...
展开
Purpose - To provide decision makers in strategic alliances a risk-time framework to: categorize types of potential deceitful behaviors by partners; and adopt appropriate deterrence mechanisms to curb and control such behavior. Design/methodology/approach - The article identifies four types of deceitful behavior, based on: the degree of relational risk that characterizes interactions of a firm with its alliance partner; and the length of the deceit horizon. Findings - Suggests a number of deterrence mechanisms for controlling the different types of deceitful behavior, with the aim of enhancing confidence in partner cooperation in alliances. Practical implications - The article provides a practical template for alliance managers to decide what kinds of deterrence mechanisms to adopt on the basis of the type of perceived deceitful behavior of alliance partners. Originality/value - The article responds to an unmet need of managers with alliance responsibilities for a framework to help select the most effective mechanisms to deter different kinds of potential deceitful behavior of alliance partners.
收起
摘要 :
Purpose - The purpose of this paper is to understand the elements of country image that influence gatekeepers of the European food distribution sector when making industrial purchasing decisions regarding imported food products. D...
展开
Purpose - The purpose of this paper is to understand the elements of country image that influence gatekeepers of the European food distribution sector when making industrial purchasing decisions regarding imported food products. Design/methodology/approach - In-depth interviews were conducted with key informants of seventeen food distribution companies and industry organisations in five European countries to determine the factors that they consider important when deciding from which countries to source food products. Findings - Confidence and trust in production systems, the integrity of regulatory systems, and the reliability of suppliers appear to be the major determinants of product-country image as viewed by gatekeepers of the food distribution channel. Practical implications - These specific factors relating to confidence, trust, integrity and reputation appear to over-ride more general perceptions of country image based on scenic or environmental considerations. Originality/value - Provides useful information for public policy makers and companies in food exporting countries.
收起
摘要 :
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization....
展开
Insider Attacks are one of the most dangerous threats organizations face today. An insider attack occurs when a person authorized to perform certain actions in an organization decides to abuse the trust, and harm the organization. These attacks may negatively impact the reputation of the organization, its productivity, and may produce losses in revenue and clients. Avoiding insider attacks is a daunting task. While it is necessary to provide privileges to employees so they can perform their jobs efficiently, providing too many privileges may backfire when users accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. In this paper, we propose a framework that extends the role-based access control (RBAC) model by incorporating a risk assessment process, and the trust the system has on its users. Our framework adapts to suspicious changes in users' behavior by removing privileges when users' trust falls below a certain threshold. This threshold is computed based on a risk assessment process that includes the risk due to inference of unauthorized information. We use a Coloured-Petri net to detect inferences. We also redefine the existing role activation problem, and propose an algorithm that reduces the risk exposure. We propose a methodology to help administrators managing inference threats. We present experimental evaluation to validate our work.
收起
摘要 :
Mobile Ad hoc Network is a type of Ad hoc network that can change locations and configure itself. Mobile ad hoc network is infrastructure-less network of mobile devices connected without wires. Each device can move independently o...
展开
Mobile Ad hoc Network is a type of Ad hoc network that can change locations and configure itself. Mobile ad hoc network is infrastructure-less network of mobile devices connected without wires. Each device can move independently on its own. So, it changes its links or connection with other devices frequently. In MANET host moves frequently in any direction, so that the topology of the network also changes frequently. No specific algorithm is used for routing the packets. Packets/data must be routed by intermediate nodes. It is prone to various attacks easily. Trust plays a pivotal role in the MANETs in predicting the trust values dynamically. There are various approaches to compute trust for a node such as fuzzy trust approach, trust management approach, hybrid approach, etc. MANET is used in many applications like military environments, civilian environments, emergency operations and personal area networking. But mostly used for Military and emergency purpose. In those, environment network connection should be perfect. It requires high level of trust in forwarding the packets to their respective destination. So, each node should forward the packets only to the trusted nodes. Trust computation based on the particular situation or context of a node, by sharing the context data onto the other nodes in the network would give a better solution to this problem. Here we present a survey on various trust management approaches in MANETs. We bring out summary of these approaches for establishing trust of the participating nodes in a dynamic and uncertain MANET environment.
收起
摘要 :
In distributed collaborative networks such as peer-to-peer systems, privacy preserving information sharing and dissemination heavily relies on effective trust management. Trust based encryption (TBE) has been proposed to be a solu...
展开
In distributed collaborative networks such as peer-to-peer systems, privacy preserving information sharing and dissemination heavily relies on effective trust management. Trust based encryption (TBE) has been proposed to be a solution to enabling privacy preserving information sharing and dissemination for such networks. Unfortunately, the previously proposed schemes are not efficient in terms of communications overhead, and require a constantly online trust authority. In this paper, we propose two trust based encryption schemes with significantly improved efficiency. In the first scheme, we develop a generic transformation approach based on the recently proposed identity based broadcast encryption (IBBE) technique, which can significantly reduce both memory space and communication overhead when static reputation is considered. For the dynamic reputation scenarios, we present a trust based encryption scheme which is based on a recently proposed revocable identity based encryption technique, resulting in significantly reduced communication overhead at the central trust authority.
收起
摘要 :
The intuitive detection theorist (IDT) model of trust posits that trust in hazard managers stems from judgments about their performance on three criteria: their ability to discriminate safe from dangerous situations (discriminatio...
展开
The intuitive detection theorist (IDT) model of trust posits that trust in hazard managers stems from judgments about their performance on three criteria: their ability to discriminate safe from dangerous situations (discrimination ability); their tendency under uncertainty to assume danger is present (response bias); and their propensity to be open and honest with the public about events (communication bias). The current article tests the model's robustness using findings from three experiments and four surveys conducted by two different research teams. Study-specific analyses and an overall analysis of the seven studies combined confirm that all three of the IDT model's dimensions are important for trust, explaining on average 43% of trust variance. These effects occurred largely independently of hazard topic, research method, or investigator. Hypothesized interaction effects among the dimensions, based upon earlier studies, were weak and contradictory; this is the first known study of interactions among trust model variables.
收起