نتایج جستجو برای: personal trust
تعداد نتایج: 206383 فیلتر نتایج به سال:
In this paper we present a new methodology which, while allowing for anonymous interaction, it also makes possible to compare decisions of cooperating or defecting when playing games within a group, according to whether or not players personally trust each other. The design thus goes beyond standard approaches to the role of trust in fostering cooperation, which is restricted to general trust. ...
Three forms of trust: topic-focused trust, general trust, and personal trust are distinguished. Personal trust is argued to be the most fundamental form of trust, deeply connected with the construction of one’s self. Information technology has posed new problems for us in assessing and developing appropriate forms of the trust that is central to our personhood.
چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...
Purpose – The purpose of this paper is to develop a value-based framework for the consumer e-trustbuilding process.Design/methodology/approach – The data collection procedure consisted of two steps. The firstwas a brief questionnaire measuring potential informants’ personal values. From this pool of potentialinformants, 30 were recruited for the interviews: five securityand ...
In view of personal information leakage risk in the process of online payment, this study puts forward a cloud protection system which can improve personal information security. The system includes two modules: personal information security model and cloud service providers trust evaluation system. Among them, the personal information security model includes four layers design: the user, interf...
Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید