نتایج جستجو برای: personal trust

تعداد نتایج: 206383  

2014
Cristina Acedo-Carmona Antoni Gomila

In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. ...

Journal: :Information 2011
Willem A. deVries

Three forms of trust: topic-focused trust, general trust, and personal trust are distinguished. Personal trust is argued to be the most fundamental form of trust, deeply connected with the construction of one’s self. Information technology has posed new problems for us in assessing and developing appropriate forms of the trust that is central to our personhood.

Journal: :Australasian Journal of Philosophy 2018

Journal: :African Journal of Business Ethics 2014

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده اقتصاد و علوم اجتماعی 1389

چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...

2009
Hannu Kuusela Heikki Karjaluoto Kyösti Pennanen

Purpose – The purpose of this paper is to develop a value-based framework for the consumer e-trustbuilding process.Design/methodology/approach – The data collection procedure consisted of two steps. The firstwas a brief questionnaire measuring potential informants’ personal values. From this pool of potentialinformants, 30 were recruited for the interviews: five securityand ...

2013
Wu Xiaogang Zhou Weifeng

In view of personal information leakage risk in the process of online payment, this study puts forward a cloud protection system which can improve personal information security. The system includes two modules: personal information security model and cloud service providers trust evaluation system. Among them, the personal information security model includes four layers design: the user, interf...

Journal: :JCP 2007
Sudip Chakraborty Indrajit Ray

Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید