• No results found

Security Trust and Privacy

Security, Trust and Privacy In Cyber (Stpc (Cyber)

Security, Trust and Privacy In Cyber (Stpc (Cyber)

... cyber security experts as to show that they contain sensitive data to keep the intruders busy in hacking those files and during that time the experts then can identify the ...

7

Privacy, Security, & Trust within the Context of Pervasive Computing pdf

Privacy, Security, & Trust within the Context of Pervasive Computing pdf

... of privacy management in the everyday world, draw- ing on studies in social psychology, suggest that privacy management is a much more nuanced and contingent ...

182

A unified trust model for pervasive computing environment

A unified trust model for pervasive computing environment

... science, trust is related to reliability and behaviour of a system according to design and ...computing, security, trust and privacy are important issues since devices need to autonomously ...

36

To what extent do millennials and non millennials differ in security and privacy perceptions on Facebook?

To what extent do millennials and non millennials differ in security and privacy perceptions on Facebook?

... improve security measures and give users of Facebook more user- friendly ...perceived privacy, security, trust, attitude, self-disclosure and social media ...

12

Internet Of Things and Trust Management in IOT – Review

Internet Of Things and Trust Management in IOT – Review

... of trust management in IOT defines trust importance in IOT ...to trust management towards the final success of IOT in different application ...care, security, transportation, food safety, and ...

7

Trust in E Business based on Website Quality, Brand Name, and Security and Privacy

Trust in E Business based on Website Quality, Brand Name, and Security and Privacy

... Schoorman, trust may be defined as “… the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, ...

6

What are the factors that determine e service quality on e recruiting sites, taking into consideration applicants’ and recruiters’ needs?

What are the factors that determine e service quality on e recruiting sites, taking into consideration applicants’ and recruiters’ needs?

... mention security/privacy, but only 20% of e-recruitment literature mentions this ...that security/privacy is a topic that is in some ways related to technical issues and would require ...

76

The effect of the Internet of Things on the customer relations aspect of business model innovation: a multiple case study of startups

The effect of the Internet of Things on the customer relations aspect of business model innovation: a multiple case study of startups

... The Internet of Things or “IoT” is a technology that has been increasing in use in recent years. The main use case of IoT has been in B2B applications, particularly production. This has been heralded as the fourth ...

112

Vol 8, No 3 (2016)

Vol 8, No 3 (2016)

... impact privacy and security of users. Privacy is to make sure that the user information is hidden from prying ...eyes. Privacy of the user is his/her personal ...core Security threats ...

11

Study on Adoption of Internet Banking services in Udaipur District  An empirical study

Study on Adoption of Internet Banking services in Udaipur District An empirical study

... Safeena, 2011) Determines the factors influencing the consumer’s adoption of internet banking in India and hence investigates the influence of perceived usefulness, perceived ease of use and perceived risk on use of IB. ...

15

Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce

Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce

... that security mechanisms are linked to users’ self-data control, authenticity system and supplementary payments methods to enable customers to control the release of their personal ...appropriate privacy ...

22

Facebook: privacy and security perceptions of millennials and non millennials

Facebook: privacy and security perceptions of millennials and non millennials

... (2010), security perception is a moderating variable between privacy perception and ...both privacy and security perception positively influences trust on ...of privacy and ...

18

Trading Privacy for Trust

Trading Privacy for Trust

... automated trust negotiation (ATN) [20] is argued to establish trust between strangers, the approach considerably differs from the TSF’s approach described in Section 1 ...disclosures, trust is ...

16

Online Full Text

Online Full Text

... the security protocol, we plan to investigate the usage of Diophantine Equation Hard Problem (DEHP) [24] [25] to provide faster cryptographic computation to replace the DDHP because of it is slower in the ...

6

How Jordanian Youth Perceive Social Networks Influence?

How Jordanian Youth Perceive Social Networks Influence?

... explored security, privacy, trust and risk taking of social networks users such as Facebook and My Space ...of privacy than those who do not, and similarly males had greater risk propensity ...

6

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF 
THINGS

A FUZZY BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF THINGS

... have trust in the political system and the ...of trust as well as confidence in election processes perhaps lower the trust in the system, also the opposite means all- ...on trust and the ...

11

Security, Privacy and Trust for Smart Mobile devices in Internet of Things – A Literature Study

Security, Privacy and Trust for Smart Mobile devices in Internet of Things – A Literature Study

... based Privacy preservation for peer to peer data sharing” tried to hide the relationship between the identity of data requester and the ...more privacy based on this ...for privacy preservation ...

5

Security and Trust Management in Cloud Computing

Security and Trust Management in Cloud Computing

... the trust assessment of the service 1. From users’ feedback, the trust behavior of a cloud service is actually a collection of invocation history records, represented by a tuple H= (C, S, F, T f), where C ...

9

Trust Management In IOT Enable Healthcare System Using Ethereum Based Smart Contract

Trust Management In IOT Enable Healthcare System Using Ethereum Based Smart Contract

... no trust between the patients, insurance company and ...or privacy of the patients is in real ...for security and privacy issue [9], [10], ...

6

Vol 5, No 5 (2017)

Vol 5, No 5 (2017)

... of trust (e.g., trust classes and trust reason) and clarify the covering ideas amongst trust and notoriety ...couple trust models are thought about in the study ...existing trust ...

7

Show all 10000 documents...

Related subjects