نتایج جستجو برای: trust in management
تعداد نتایج: 17141552 فیلتر نتایج به سال:
Trust is situation-specific and the trust judgment problem with which the truster is confronted might be, in some ways, similar but not identical to some problems the truster has previously encountered. The truster then may draw information from these past experiences useful for the current situation. We present a knowledgeintensive and model-based case-based reasoning framework that supports t...
Trust and Trust Management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. Recent spate of national and global high-impact Cyber Security compromises, threats, vulnerabilities, and exposures leads to fundamental questioning of Trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing Distrust. It is ...
context: management of health care organizations based on employee's mutual trust will increase the improvement in functions and tasks. aims: the present study was performed to investigate the relationship between organizational trust and the nurse administrators' productivity in educational health centers of in the health-education centers of isfahan university of medical sciences. settings an...
Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. However, the unique characteristics of MANETs have imposed great challenges in designing a fully distributed public key management protocol under resource-constrained MANET environments. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. ...
Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Diffe...
The purpose of this study is to explain the model of auditor trust in the client with an emphasis on pathology and presenting a strategy using a qualitative research method and grounded theory approach. This study was conducted in 1398 by conducting 12 in-depth interviews with partners of auditing institutes, members of the Iranian Society of Certified Public Accountants and the Audit and Manag...
Trust management is the main challenges in the cloud service environment. Trust management can be used to finding the securable service in the cloud environment. In this paper to focusing the trustable feedback analysis and also scalable analysis in both the consumer’s and provider privacy. Consumer privacy is not an easy goal for determining the information in both the trust management servers...
The Internet of Things – IoT – is a new paradigm in technology that allows most physical ‘things’ to contact each other. Trust between IoT devices is a critical factor. Trust in the IoT environment can be modeled using various approaches, such as confidence level and reputation parameters. Furthermore, trust is an important element in engineering reliable and scalable networks. In this paper, w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید