University College Dublin: Eroding trust in experts to be quizzed as UCD researchers awarded EUR3m Horizon 2020 grant The findings are significant because most research has suggested that source credibility is a combination of trustworthiness and expertise. Is that News "Fake" or Simply Biased? To ...
business trustworthinesspower producing management systemTo industry software Trustworthiness problem, an idea aiming to business to construct industry software trustworthiness criterion is proposed. Based on the triangle model of "trustworthy grade definitiontrustworthy evidence model-trustworthy evaluating", the...
Based on the triangle model of “trustworthy grade definition-trustworthy evidence model-trustworthy evaluating”, the idea of business trustworthiness is incarnated from different aspects of trustworthy triangle model for special industry software, power producing management system (PPMS). Business ...
S is the set of students in the group and R is the set of rules and characteristics (eg, time factor). These indicators were described above when presenting research instruments . Once trustworthiness indicators have been selected, trustworthiness levels can be expressed as follows: (4.2)Ltwi...
Additionally, the sample entropy evaluation is employed in the research to determine complexities and endorse the existence of chaos. To maintain stability and synchronize the system, nonlinear controllers are additionally provided. The study highlights the technique’s vulnerability to fractional-order ...
Research has also determined that the concepts of work and family have different significance and importance in different cultures (Polemans, Spector, Cooper and Allen, 2003). There is also considerable support for the role of individual differences in the formation of perceptions of trustworthiness....
we find that there is little research on destination trust.When branding a tourism destination,it is essential to consider tourist trust in the destination.Therefore,in tourism theory,it is vital to investigate whether the tourist has faith in the destination,and to consider its definition,...
The following describes the zero-knowledge proof system, one of the preliminary ideas we proposed about privacy preservation on a 6G blockchain, which marks the start of our research. In the Nakamoto model all transactions in a blockchain are in plain text. Hence, a native privacy algorithm ne...
Although some trustworthiness methods have been proposed and investigated, they have been little investigated in CSCL with the aim of enhancing security properties. Therefore, we propose to conduct research on security in CSCL by enhancing technological security solutions with trustworthiness, and through ...
to address PH data security and privacy whilst computing. Our survey found that there are no significant difficulties for the security and privacy of PH data-at-rest and data-in-transit; however, privacy and security of PH data-in-use are still an active research field. In this aspect, we...