Global IT and IT-enabled services [PDF]
Several topics that were covered during the IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE) held in September 2008, in Tianjin, China, are presented.
Ball, GL +4 more
core +1 more source
Collaborative systems are growing in use and popularity. The need to boost the methods concerning the interoperability is growing as well; therefore, trustworthy interactions of the different systems are a priority.
Jorge Lopez +2 more
doaj +1 more source
Let Your CyberAlter Ego Share Information and Manage Spam [PDF]
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of
Boykin, P. Oscar +4 more
core +1 more source
An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks
Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes.
Jin Zhao, Jifeng Huang, Naixue Xiong
doaj +1 more source
Worker discontent, voice, and EI programs in Japan: Evidence from the Japanese worker representation and participation survey [PDF]
Using a unique new survey, the Japanese Worker Representation and Participation Survey (JWRPS), this paper documents that there is currently an alarming degree of worker discontent in Japan.
Chuma, Hiroyuki +2 more
core +2 more sources
Trust Information-Based Privacy Architecture for Ubiquitous Health
BackgroundUbiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space.
Ruotsalainen, Pekka Sakari +3 more
doaj +1 more source
A Double-Layer Blockchain Based Trust Management Model for Secure Internet of Vehicles
The Internet of Vehicles (IoV) enables vehicles to share data that help vehicles perceive the surrounding environment. However, vehicles can spread false information to other IoV nodes; this incorrect information misleads vehicles and causes confusion in
Wenbo Ruan +4 more
doaj +1 more source
TRUST AND MANAGEMENT CONTROL SYSTEM: A STUDY ON META-SINTHETIC INTERACTIONS
Management accounting has been associated to the institutionalization of trust inside organizations. Trust allows the implementation of systems which grant freedom to choose without trying to process more information about the world than it ought to be ...
Patricia Villa Costa Vaz +1 more
doaj +1 more source
Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET
The information sharing among internet-connected vehicles is close, but there may be the issue of vehicles providing false information. This paper proposes a new incentive mechanism scheme for VANET to provide a decentralized and trusted service ...
Hongmu Han +4 more
doaj +1 more source
Perceptions about data-informed decisions: an assessment of information-use in high HIV-prevalence settings in South Africa [PDF]
BACKGROUND: Information-use is an integral component of a routine health information system and essential to influence policy-making, program actions and research.
A Aqil +50 more
core +3 more sources

