Showing 1 - 10 of 87,250
is obvious for the trusting peer to analyze the Risk beforehand that could be involved in dealing with a trusted peer in … of choosing a peer to interact with by analyzing the Risk that could be involved in dealing with each of the possible … which peer to interact with after analyzing the Risk that could be associated in dealing with each of them. …
Persistent link: https://www.econbiz.de/10009434921
buy is based on the Risk-adjusted cost benefit analysis. If the trusting peer can determine the future Riskiness value or … predicts the dynamic nature of Risk and determines the future Riskiness value of the trusted peer, before the interaction …The trusting peer in order to determine the likelihood of the loss in its resources might analyze the Risk before …
Persistent link: https://www.econbiz.de/10009434919
be the foundation for web intelligence in the future. Trust and Reputation help capture business intelligence through … establishing customer trust relationships, learning consumer behaviour, capturing market reaction on products and services …
Persistent link: https://www.econbiz.de/10009434974
Trust between communicating peers is increasingly catching the attention of the research community. Several methods … have been proposed to assist the task of establishing trust between communicating peers; all of which make use of … existing proposed trust models. We also show that the different types of reputation along the three dimensions are interrelated …
Persistent link: https://www.econbiz.de/10009434975
Persistent link: https://www.econbiz.de/10012506301
Persistent link: https://www.econbiz.de/10014382209
interaction the trusting agent, in order to analyse the Risk, has to consider the possible likelihood of failure of the … from a set of probable trusted agents. In this paper, we propose a fuzzy risk based decision making system that would …
Persistent link: https://www.econbiz.de/10009434916
Persistent link: https://www.econbiz.de/10012598443
incorporation of IT Security measures in each SDLC phase is also discussed. This is due to its direct relevance and correlation with … information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …. From there appropriate privacy protecting and security techniques are applied to address these issues. Special mention is …
Persistent link: https://www.econbiz.de/10009434972
Persistent link: https://www.econbiz.de/10010239087