Recovering From Trust Breakdowns In Large System Implementations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recovering from Trust breakdowns in Large System Implementations

On the basis of experiences from the Faroese large-scale implementation of integrated healthcare information systems and insights into dynamic aspects of trust, we offer the following lessons learned for the successful management and recovery of trust (breakdowns) in large system implementations: restore relations by turning towards face-to-face events and procedures, assure a well-functioning ...

متن کامل

An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings

The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Trust recovery requires a more complex mechanism to explore different factors that cause the decline of trust and identify the affected individuals of...

متن کامل

Analyzing Trust Perceptions In System Implementations

Implementations of large scale information systems are complex and problematic with a reputation for being delayed and going over budget. A critical factor in the success of these implementations is trust in the system, in the project and between the various stakeholders. As problems and delays mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both ...

متن کامل

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table

We introduce the notion of re-establishing trust in compromised systems, specifically looking at recovering from kernel-level rootkits. An attacker that has compromised a system will often install a set of tools, known as a rootkit, which will break trust in the system as well as serve the attacker with other functionalities. One type of rootkit is a kernel-level rootkit, which will patch runni...

متن کامل

Recovering from Operating System Errors

User applications and data in volatile memory are usually lost when an operating system crashes because of errors caused by either hardware or software faults. This is because most operating systems are designed to stop operation when some internal errors are detected irrespective of the possibility that user data and applications might still be intact and recoverable. Techniques like exception...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Technology Case and Application Research

سال: 2011

ISSN: 1522-8053,2333-6897

DOI: 10.1080/15228053.2011.10856207