نتایج جستجو برای: kinds of trust

تعداد نتایج: 21170760  

2013
Alan Tomkins Brian H. Bornstein Alan J. Tomkins Elizabeth M. Neeley Mitchel N. Herian Joseph A. Hamm

This article examines the effectiveness of using different kinds of written reminders to reduce misdemeanor defendants’ failure-to-appear (FTA) rates. A subset of defendants was surveyed after their scheduled court date to assess their perceptions of procedural justice and trust and confidence in the courts. Reminders reduced FTA overall, and more substantive reminders (e.g., with information o...

2012
Renu Dalal Manju Khari

Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can join the network and leave the network in dynamic per...

Journal: :the international journal of humanities 2010
hassan abedi jafari mohammad ali sarlak

the current research tries to offer a conceptual model in order to create trust among people for choosing virtual universities. to this end, the conceptual model of research has been designed with nine factors. the relationship among factors tested by using statistical methods such as factor analysis and path analysis. in the end, five components were established from among the affecting factor...

Journal: :The Journal of applied psychology 2006
Daniel Z Levin Ellen M Whitener Rob Cross

Prior meta-analytic evidence has indicated no association between relationship length and perceived trustworthiness. Viewing trustors as information processors, the authors propose a model in which relationship length, although having no direct effect on perceived trustworthiness, moderates the association between perceived trustworthiness and the basis on which people decide to trust each othe...

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

Journal: :فصلنامه علوم اجتماعی 0
محمد حسین پناهی هیئت علمی دانشگاه علامه طباطبایی فریبا شایگان هیئت علمی دانشگاه علامه طباطبایی

political trust addresses the relation between people and state. researches say political trust has had a declining trend in iran since the victory of the revolution. religion is among the factors which affect political trust, and has been emphasized in the theories of the classical and contemporary sociologists and social capital theorists. this fact is more considerable in iran where a religi...

2001
Y. H. Tan S. Santosa E. Stam

In this paper we extend the generic trust model that was introduced in Tan and Thoen. The model of Tan and Thoen addresses in a generic way the issues related to how to build trust for conducting a first trade transaction in electronic commerce (i.e. a trade transaction in an electronic environment between two possibly international parties who are new to each other or have not conducted trade ...

Ali Hashemianfar Ali Hejazifar, Shaaban Bozorgi

Social trust is one of the important factors of the social relations, the social order and also the social capital. It also possesses an effective role in the development of the society. Its increase and decrease will influence on the primary groups and institutions to the entire society. Social trust is influenced by various factors and variables. The change in these factors will change the ex...

Journal: :IJSN 2006
Joseph B. Evans Weichao Wang Benjamin J. Ewy

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques must begin with a thorough analysis of the requirements and a deeper understanding of the approaches that are practical within the system const...

2013
Kay Behrenbruch Matthias Söllner Jan Marco Leimeister Ludger Schmidt

Technology is becoming increasingly automated, aiming to ease the life of its users. However, besides the advantages of this trend, users are also faced with increasing risks, e.g., regarding their privacy. Examples are seamless online payments that come with the requirement to provide sensitive, e.g., credit card information, or social networks trying to elicit private information for its user...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید