نتایج جستجو برای: reputation aggregation

تعداد نتایج: 78611  

2007
Rosa de Carvalho

This paper investigates the concept of corporate reputation and corporate image. Corporate image is the product of the experiences of a product or service and the messages sent by an organisation, while corporate reputation is the product of management behaviours and organisation-public relationships. This paper explores whether corporate reputation can be managed and who manages it. It is espe...

2013
Omar Hasan Lionel Brunie

Reputation management is a powerful security tool that helps establish the trustworthiness of users in online applications. One of the most successful use of reputation systems is on e-commerce web sites such as eBay.com and Amazon.com, which use reputation systems to root out fraudulent sellers. Reputation systems can also play an important role in social networks to enforce various security r...

2009
Machteld Van den Bogaerd Walter Aerts

A positive corporate reputation is generally taken to be a valuable resource leading to competitive advantage. In this paper we examine the association between a firm's media reputation and the amount of trade credit given in a sample of listed UK firms. Consistent with expectations, our results show that a firm's willingness to extend trade credit to its customers is inversely related to its m...

2012
Yasaman Haghpanah Marie desJardins

Several reputation models have been introduced to deal with the problem of biased reputation providers. Most of these models discount or discard biased information received from the reputation providers, and most of them are not appropriate when a large population of information providers are biased or dishonest. In this paper, we present a probabilistic approach for reputation modeling, the Pr...

2004
Jinshan Liu Valérie Issarny

Interactions between entities unknown to each other are inevitable in the ambient intelligence vision of service access anytime, anywhere. Trust management through a reputation mechanism to facilitate such interactions is recognized as a vital part of mobile ad hoc networks, which features lack of infrastructure, autonomy, mobility and resource scarcity of composing light-weight terminals. Howe...

2009

Reputation assessment is particularly needed in peer-to-peer systems because peers can have conflicting interests and their autonomy is amplified by the inherent decentralization of the environment. However, the lack of centralization makes it more difficult to perform reputation assessment. Existing reputation systems tackle the reputation assessment process in an ad-hoc manner. In this thesis...

2014
Zhong Yao Xi Xu Yongchao Shen

With the improvement of China's Internet penetration and a shift in consumption consciousness, user scale and market size of online trading reached a new height, and C2C e-commerce has the most rapid development. As the seller and buyer of online transaction in a state of isolation in time and space, there is serious information asymmetry. So the reputation problems that exist in the online tra...

Journal: :Computer Science (AGH) 2015
Paulina Adamska

Q&A systems are becoming a vital source of knowledge in many different domains. In some cases, they are also associated with services which provide employers with important information regarding the expertise of its potential employees. Therefore, the reputation earned in such communities can be associated with better job opportunities, and its significance is increasing. However, in a communit...

Journal: :CoRR 2013
Ruchir Gupta Yatindra Nath Singh

In peer-to-peer networks, free riding is a major problem. Reputation management systems can be used to overcome this problem. Reputation estimation methods generally do not consider the uncertainties in the inputs. We propose a reputation estimation method using BLUE (Best Linear Unbiased estimator) estimator that consider uncertainties in the input variables.

2007
Xia Zhao

Whether and how to disclose software vulnerability information has been debated intensely. An optimal disclosure policy should balance the tradeoff between its impact on software vendors' incentives and the potential risks imposed on customers. Previous research on software vulnerability primarily focused on the timing aspect of the disclosure policy. In this paper, we investigate another dimen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید