نتایج جستجو برای: trustworthiness

تعداد نتایج: 4710  

2010
Gang Lu Huaimin Wang Xiaoguang Mao

Trustworthy software evaluation is taken as the multi-criteria decision aiding process in this paper. The use of ELECTRE TRI method for evaluating software trustworthiness is presented. Software under evaluation is compared with some predefined norms and is assigned to one of trust levels. The entire evaluating process is described, including definition of problem situation and formulation, det...

Journal: :JSW 2012
Li Shi Shanlin Yang Kai Li Ben-gong Yu

Software is everywhere. However, software is not always trustworthy. Confronting the demand of software trustworthiness evaluation, this paper proposes a novel software trustworthiness evaluation approach based on combination weights (CW) and improved TOPSIS methods. The determination of CW relies on exper gments and mathematical computation together. FAHP method is used to determine the import...

2010
Sergey Bratus Michael E. Locasto Brian Schulte

The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static program code. We suggest an approach to dynamic, runtime measurement of software trustworthiness properties as they relate to code-data owernship relationships. We outline a system, SegSlice, that actively involves the TPM ...

Journal: :JSW 2014
Li Shi Shanlin Yang Ke Huang

Based on the software evolution theory, this paper discusses the software trustworthiness growth process in which software trustworthiness gradually develops from low trustworthy state into high trustworthy state, presents the cycle model of software trustworthiness growth and summarizes the key factors of influencing trustworthiness growth. On this basis, the relative expansion concepts of tru...

Journal: :Sociological Science 2016

Journal: :Philosophy of Science 2023

Abstract Extant accounts of trust in science focus on reconciling scientific and public value judgments, but neglect the challenge learning audience values. I argue that for experts to be epistemically trustworthy, they should adopt a cooperative approach about values their audience. A approach, which expert non-expert inquirers iteratively refine better achieves important second-order epistemi...

2003
Peter Katuščák Joel Slemrod

We analyze the determinants of trust and trustworthiness in a matching equilibrium when agents have heterogeneous predispositions towards trusting and trustworthy behavior, there is transmission of information via both individual and collective reputations, and successful matches may persist. In new matches, more social trustworthiness breeds more individual trust. However, whether more social ...

2014
Qian Tian Xiaoling Li Silu Yu Xinjian Li

Crowdsourcing e-market provides a lot of advantages to solve problems of organizations, companies and individuals. As a result, it’s important to develop an understanding of online reference group and participation behavior of crowd. The authors argue that reference group can obtain trustworthiness in the eyes of the crowd, such as integrity trustworthiness and ability trustworthiness. The trus...

Journal: :Journal of cognitive neuroscience 2018
Shuo Wang Virginia Falvello Jenny Porter Christopher P Said Alexander Todorov

People often make approachability decisions based on perceived facial trustworthiness. However, it remains unclear how people learn trustworthiness from a population of faces and whether this learning influences their approachability decisions. Here we investigated the neural underpinning of approach behavior and tested two important hypotheses: whether the amygdala adapts to different trustwor...

2015
Nazila Gol Mohammadi Torsten Bandyszak Abigail Goldsteen Costas Kalogiros Thorsten Weyer Micha Moffie Bassem I. Nasser Mike Surridge

The analysis of existing software evaluation techniques reveals the need for evidence-based evaluation of systems’ trustworthiness. This paper aims at evaluating trustworthiness of socio-technical systems during designtime. Our approach combines two existing evaluation techniques: a computational approach and a risk management approach. The risk-based approach identifies threats to trustworthin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید