Search results for "trust"

showing 10 items of 446 documents

REGULATION OF THE RIGHTS OF CHILDREN IN OUT-OFHOME CARE BY TRUSTEE IN LATVIAN AND INTERNATIONAL POLITICS

2015

This article provides an analysis of the way in which the Latvian regulatory framework in force determines the fulfilment of the needs of the child in out-of-home care by trustee and stability. This analysis indicates that in Latvian legislation the concept of “interests of the child” has not been clearly stated, in this regard, the Latvian legislation provides information of the rights of the child and the fulfilment of his physical needs. The concept of trustee and the existence of the concept is not mentioned. In contrast, international declarations and conventions on the topic of the protection of the rights of the child are much more humanitarian; in those documents, love and understan…

International relationsPolitical scienceLawmedia_common.quotation_subjectlanguageLatvianPersonalityLegislationinterests of the child; out-of-home care; regulatory framework; rights of children; trusteelanguage.human_languagemedia_commonSOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference
researchProduct

Selection and evaluation of Internet information by adults with intellectual disabilities

2018

Internet offers people with intellectual disabilities (ID) unique opportunities to access information and to participate in society. But concerns have been raised about the potential risks they face when accessing the Internet (e.g. giving credit to false information, being exposed to manipulative content). As part of the current debate between positive risk-taking and overprotection, our study empirically tested the extent to which 43 adults with ID identified and selected topically relevant as well as trustworthy web pages while searching the Internet for several topics (e.g. Can social networks use your pictures for advertisement?). Participants also justified their search decisions. Res…

Internet privacyPositive risk-takingHealth Professions (miscellaneous)EducationIntellectual disabilitiesDidáctica y Organización EscolarIntellectual disabilityCredibilityDevelopmental and Educational Psychologymedicine0501 psychology and cognitive sciencesSelection (genetic algorithm)TrustworthinessInternet risksbusiness.industryInformation seekingInformation literacy05 social sciences050301 educationmedicine.diseaseInternet searchTrustworthinessThe InternetbusinessPsychology0503 educationInclusion (education)050104 developmental & child psychology
researchProduct

Motivational drivers of behavioral online brand engagement in content consumption context : examining brand commitment and trust in online content as…

2015

The Internet has become increasingly important for companies in recent years. However, online environment possesses many challenges for both managers and researchers. Moreover, it is not until recently engagement concept has begun to emerge in the marketing literature. However, it is known that engagement has a strong influence on many favorable customer outcomes. Thus, engagement is a fruitful research topic in online environment. The purpose of this explanatory study is to examine behavioral dimension of online brand engagement in context of content consumption. This study examines the effects of five motivational drivers (community, information, entertainment, identity, and remuneration)…

Internetbränditmotivational drivertavaramerkitbrand purchase intentionBehavioral online brand engagementonline content consumptionbrand commitmenttrust
researchProduct

Collaboration interprofessionnelle et émergence de la confiance en management hospitalier

2022

Patient support requires interprofessional collaboration that is complex to implement in hospital organizations. According to the literature, this is closely linked to the emergence of trust. This emergence depends on organizational factors that are only partially identified in the literature, the links established remaining minimal and imprecise. We propose in this qualitative study carried out with 32 agents of the public hospital service to specify and complete these links. In particular, this work opens up new perspectives regarding organizational factors such as connectivity, values, common goals, etc. The identified factors are declined through 2 perspectives directly transposable in …

Interprofessional collaborationHospitalEmergent stateCollaboration interprofessionnelleConfianceTrust[SHS.GESTION] Humanities and Social Sciences/Business administrationHôpitalEtat émergent
researchProduct

I programmi di clemenza nel diritto antitrust italiano

2007

Intese restrittive della concorrenzaDiritto antitrust; Intese restrittive della concorrenza; Programmi di clemenzaDiritto antitrustProgrammi di clemenza
researchProduct

Carry a big stick, or no stick at all: Punishment and endowment heterogeneity in the trust game

2016

AbstractWe investigate the effect of costly punishment in a trust game with endowment heterogeneity. Our findings indicate that the difference between the investor and the allocator’s initial endowments determines the effect of punishment on trust and trustworthiness. Punishment fosters trust only when the investor is wealthier than the allocator. Otherwise, punishment fails to promote trusting behavior. As for trustworthiness, the effect is just the opposite. The higher the difference between the investor and the allocator’s initial endowments, the less willing allocators are to pay back. We discuss the consistency of our findings with social preference models (like inequality aversion, re…

Intrinsic and extrinsic motivationPunishmentDeterrence hypothesisCrowding-outExperimental economicsTrust gameEndowment heterogeneity
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

Is the French mobile phone cartel really a cartel?

2009

International audience; France Telecom (FT), SFR and Bouygues Telecom (BT) have been fined by France's Conseil de la Concurrence (CC) for organizing a mobile phone cartel with stable market shares (one-half, one-third and one-sixth, respectively) and for directly exchanging commercial information. While not contesting the legal decision, it is argued here that the economic reasoning is flawed. (1) As the CC made much of the firms' stable market shares, we have first followed this line of reasoning by considering that the market shares are quotas under uniform costs. Even if there is a general incentive to form a monopolistic cartel, BT was too small for it to be worth its while to join it; it i…

JEL : K - Law and Economics/K.K2 - Regulation and Business Law/K.K2.K21 - Antitrust LawEconomics and EconometricsCournotJEL: L - Industrial Organization/L.L1 - Market Structure Firm Strategy and Market Performance/L.L1.L13 - Oligopoly and Other Imperfect MarketsStackelbergMobile telephonyCartelJEL L13 L41 L96 D43 K21Management Science and Operations ResearchCournot competitionIndustrial and Manufacturing EngineeringMicroeconomicsCompetition (economics)Monopolistic competitionJEL : L - Industrial Organization/L.L1 - Market Structure Firm Strategy and Market Performance/L.L1.L13 - Oligopoly and Other Imperfect MarketsEconomicsStackelberg competition[ SHS.ECO ] Humanities and Social Sciences/Economies and financesMarket shareGSMARCEPJEL : D - Microeconomics/D.D4 - Market Structure Pricing and Design/D.D4.D43 - Oligopoly and Other Forms of Market ImperfectionCartel[SHS.ECO]Humanities and Social Sciences/Economics and FinanceGeneral Business Management and AccountingJEL : L - Industrial Organization/L.L9 - Industry Studies: Transportation and Utilities/L.L9.L96 - TelecommunicationsJEL: D - Microeconomics/D.D4 - Market Structure Pricing and Design/D.D4.D43 - Oligopoly and Other Forms of Market ImperfectionJEL: K - Law and Economics/K.K2 - Regulation and Business Law/K.K2.K21 - Antitrust LawJEL: L - Industrial Organization/L.L9 - Industry Studies: Transportation and Utilities/L.L9.L96 - TelecommunicationsJEL : L - Industrial Organization/L.L4 - Antitrust Issues and Policies/L.L4.L41 - Monopolization • Horizontal Anticompetitive PracticesConseil de la ConcurrenceIncentiveMonopolyMobile phoneJEL: L - Industrial Organization/L.L4 - Antitrust Issues and Policies/L.L4.L41 - Monopolization • Horizontal Anticompetitive PracticesInternational Journal of Production Economics
researchProduct

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks

2012

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…

Key distribution in wireless sensor networksComputer sciencebusiness.industryRobustness (computer science)Wireless ad hoc networkDistributed computingComputer data storageScalabilityTrusted ComputingTrusted third partybusinessWireless sensor networkComputer network2012 IEEE 13th International Conference on Mobile Data Management
researchProduct

LEADERSHIP VALUES IN TRANSFORMATION OF ORGANIZATIONAL CULTURE TO IMPLEMENT COMPETITIVE INTELLIGENCE MANAGEMENT: THE TRUST BUILDING THROUGH ORGANIZATI…

2015

The purpose of this paper is to explore the role of leadership values in changing of organizational culture to implement competitive intelligence. General criteria and values should be defined for observance in the processes of competitive intelligence management. Organizational culture can be supportive of changes when it corresponds with the prevailing values. The aim of this study was to do an investigation within companies in Latvia, research the scientific resources on this matter as well as understand the leadership values that stimulate the successful implementation of competitive intelligence management. The study was performed in two stages: first, the examination of the process of…

Knowledge managementCompetitive intelligenceDistrustbusiness.industryProcess (engineering)media_common.quotation_subjectLatvianOrganizational cultureOrganizational commitmentPublic relationslanguage.human_languageKnowledge sharingOrganization developmentlanguagebusinessmedia_commonEuropean Integration Studies
researchProduct