• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 48
Next 10 →

Trustworthiness as an Asset (Extended abstract)

by Pekka Nikander
"... Abstract: People posses an innate capability to instinctively evaluate the trustworthi-ness of other people in their daily lives, and a hardwired tendency to react strongly if they feel betrayed. However, these capabilities do not work in the digital domain, for both obvious and not-so-obvious reaso ..."
Abstract - Add to MetaCart
-so-obvious reasons. Therefore, something else is needed. In this paper we explore the prequisites and difficulties that are encountered when attempting to establish a bases for trust and trustworthy behaviour in the Internet, concentrating on the asset like nature of trustworthiness. 1

Economic Asset�

by Paul N. Wilson, Ana M. Kennedy
"... Trustworthiness as an ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Trustworthiness as an

Towards Trustworthy Cryptographic Protection of Airplane Information Assets

by Basel Alomair, Krishna Sampigethaya, Andrew Clark, Radha Poovendran
"... Digital signature is emerging as an accepted solution for protecting aircraft assets during their storage and distribution over computer networks in aviation information systems (AIS). However, the design of trustworthy signature protocols that can address the unique challenges of AIS is an open pro ..."
Abstract - Add to MetaCart
Digital signature is emerging as an accepted solution for protecting aircraft assets during their storage and distribution over computer networks in aviation information systems (AIS). However, the design of trustworthy signature protocols that can address the unique challenges of AIS is an open

Trustworthy Services Through

by John Lyle , 2010
"... Remote attestation is a promising mechanism for assurance of distributed systems. It allows users to identify the software running on a remote system before trusting it with an important task. This functionality is arriving at exactly the right time as security-critical systems, such as healthcare a ..."
Abstract - Add to MetaCart
and the overhead of integrity reporting is more appropriate on a server which may be protecting important assets. However, a literature review and new experiments show that problems remain, many stemming from the large trusted computing base as well as the lack of information linking software identity to expected

©2004 INFORMS Organizational Trustworthiness: Findings from the Population of Organizational Ethnographies

by Randy Hodson
"... Contemporary workplaces solicit heightened effort and initiative from employees through teams and related forms ofparticipation. Trustworthy behavior on the part of organizations is an important precondition for heightened employee effort and initiative. The current article develops a model of organ ..."
Abstract - Add to MetaCart
-methods comparisons for advancing organizational theory. Key words: organizational trustworthiness; organizational citizenship; workplace conflict; coworker relations; employment practices; management; leadership Most employers verbally support the principle that “people are our most important asset, ” but this claim

THE NLM IS AN INTERNATIONALLY RECOGNIZED ASSET OF THE NIH

by Doug B Fridsma
"... rector, Francis Collins, MD, PhD, charged the NLM working group to articulate a new, strategic vision for the NLM. The NLM has been a tremendous supporter of informatics, and this new report provides insight into the role that NLM will play in the future. It articulates a vision for how the NLM can ..."
Abstract - Add to MetaCart
continue to be a trustworthy source of biomedical data and information, an advocate for open science, a promoter of the next generation of data scientists, a protector of the legacy of the past, and a vital partner for those who are generating biomedical knowledge for the future.

M.: Combining Risk Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems

by Nazila Gol Mohammadi , Torsten Bandyszak , Abigail Goldsteen , Ka-Logiros Costas , Thorsten Weyer , Micha Moffie , Bassem Nasser , Mike Surridge , 2015
"... Abstract. The analysis of existing software evaluation techniques reveals the need for evidence-based evaluation of systems' trustworthiness. This paper aims at evaluating trustworthiness of socio-technical systems during designtime. Our approach combines two existing evaluation techniques: a ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
computational approach and a risk management approach. The risk-based approach identifies threats to trustworthiness on an abstract level. Computational approaches are applied to evaluate the expected end-to-end system trustworthiness in terms of different trustworthiness metrics on a concrete asset instance

THE IMPACT OF HUMAN ASSET SPECIFICITY ON THE SOURCING OF APPLICATION SERVICES

by unknown authors
"... The question concerning the circumstances under which it is advantageous for a company to outsource certain information systems functions has been a controversial issue for the last decade. While opponents emphasize the risks of outsourcing based on the loss of strategic potentials and increased tra ..."
Abstract - Add to MetaCart
in creating strategic benefits through IS if the provision of application services requires a high amount of firm specific human assets. These relationships, however, are partially moderated by differences in the trustworthiness and intrinsic motivation of internal versus external IS professionals. Moreover

Challenges in Aviation CPS Asset Collection and Distribution

by Krishna Sampigethaya, Scott Lintelman, Richard V Robinson, Mingyan Li
"... Abstract. The future airplane will possess advanced sensing, computation and communication technologies to enable remote, automated monitoring and control of different aspects of airplane operation and mainte-nance. We view such an “e-enabled airplane ” as a cyber-physical system to fundamentally un ..."
Abstract - Add to MetaCart
in the trustworthy design, development, verification and validation of e-enabled vehicles in the next-generation air, road and rail transportation. 1 E-enabled Airplane as a CPS Today, aviation is faced with a formidable challenge of accommodating an unprecedented increase in air traffic, while improving passenger

TESTING THE MODERATED AND MEDIATED IMPACT OF HUMAN ASSET SPECIFICITY ON THE SOURCING OF APPLICATION SOFTWARE SERVICES

by Jens Dibbern , et al. , 2004
"... The question concerning the circumstances under which it is advantageous for a company to outsource certain information systems functions has been a controversial issue for the last decade. While opponents emphasize the risks of outsourcing based on the loss of strategic potentials and increased tra ..."
Abstract - Add to MetaCart
in creating strategic benefit through IS if the provision of application services requires a high amount of firm specific human assets. These relationships, however, are partially moderated by differences in the trustworthiness and intrinsic motivation of internal versus external IS professionals. Moreover
Next 10 →
Results 1 - 10 of 48
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University