Results 21 to 30 of about 185,761 (273)
Cloud financial accounting informatization is a product of the combination of accounting work and information technology, a current demand for financial information management in the new era, and a necessary means for enterprises to enhance their core ...
Yanxing Li, Jinghai Wang
doaj +1 more source
Trust Management in Social Internet of Things (SIoT): A Survey
A survey on trust management in the Social Internet of Things (SIoT) is provided, beginning with a discussion of SIoT architectures and relationships. Using a variety of publication databases, we describe efforts that focus on various trust management ...
Sana Alam+4 more
doaj +1 more source
As the vast amount of data in social Internet of Things (IoT) environments considering interactions between IoT and people is accumulated and processed through cloud and big data technologies, the services that utilize them are applied in various fields.
Tai-Won Um+3 more
doaj +1 more source
Implementing building information modeling (BIM) in construction projects can provide team members with an effective collaboration process. Therefore, organizations are implementing BIM to acquire the benefits.
Abdelrahman M. Farouk+4 more
doaj +1 more source
Forming Trust in the Medical System Through Marketing Activities of Medical Institutions of Certain Territories [PDF]
The peculiarity of social development in modern life is the development of the role of knowledge and information in society, in the intensive promotion of information technology, and in the formation of new qualitative forms of information interaction ...
Anna Rosokhata+4 more
doaj +1 more source
Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry.
Syed Arham Hussaini+2 more
doaj +1 more source
Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method
Power Internet of things terminal (IoT) equipment is vulnerable to identity camouflage, information theft, data tampering and other security threats. Traditional security methods can not resist the network internal attacks from damaged terminals.
Feng ZHAI+5 more
doaj +1 more source
RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things
In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. Sharing information among different
Kamran Ahmad Awan+5 more
doaj +1 more source
Study on Database Management System Security Issues
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their ...
Mohd Amin Mohd Yunus+3 more
doaj +1 more source
User satisfaction with information system quality has long been a substantial topic in the literature of information system (IS). Based on the key constructs of IS success model (including system quality and information quality) and technology acceptance
Nguyen Tran Thuy Trang, Nguyen Manh Tuan
doaj +1 more source