Search results for "trust"
showing 10 items of 446 documents
La tutela della concorrenza nella Repubblica Popolare Cinese
2014
La tesi dal titolo “La tutela della concorrenza nella Repubblica Popolare Cinese” si propone di affrontare l’intricato problema dell’armonizzazione dei principi della concorrenza in un sistema economico in via di transizione quale quello cinese. L’attenzione sulla questione è stata stimolata dall’emanazione della legge antimonopoli, entrata in vigore nell’agosto del 2008, che ha conosciuto le sue prime applicazioni concrete nel corso di questi primi cinque anni . Cercando di non lasciarsi sviare dalla tentazione di giudicare la normativa antitrust paese asiatico sul presupposto di una presunta superiorità degli ordinamenti dei paesi occidentali, che in materia posseggono una tradizioni di o…
La tutela del convivente non intestatario con riguardo agli apporti conferiti per l’acquisto della casa familiare. Confronti comparatistici.
2013
The essay deals with the financial consequences of the breakdown in relationships between cohabitants through the use of the comparative method applied to English and Italian legal systems. In particular, it explores the case in which the property of family home is conveyed into the sole name of one party, while the other party contributed directly (e.g. through financial contributions to mortgage payments) or indirectly (e.g. payments of the domestic bills) to the payment of the purchase price. Under Italian law, the remedy available for the non-owner cohabitant is identified with unjust enrichment, but it will be accessible only when that contributions to the acquisition of property lacks…
Psychodynamiques de la vie au travail: la qualité des relations verticales en tant que promoteurs d’engagement, de justice et de confiance organisati…
2008
Anatomy of Cartel Contracts
2013
We study cartel contracts using data on 18 contract clauses of 109 legal Finnish manufacturing cartels. One third of the clauses relate to raising profits; the others deal with instability through incentive compatibility, cartel organization, or external threats. Cartels use three main approaches to raise profits: Price, market allocation, and specialization. These appear to be substitutes. Choosing one has implications on how cartels deal with instability. Simplifying, we find that large cartels agree on prices, cartels in homogenous goods industries allocate markets, and small cartels avoid competition through specialization.
Slacking with the Bot: Programmable Social Bot in Virtual Team Interaction
2021
Nonhuman communicators are challenging the prevailing conceptualizations of technology-mediated team communication. Slackbot is a social bot that can be configured to respond to trigger words and, thus, take part in discussions on the platform. A set of 84 bot-related communication episodes were identified from a journalistic team's Slack messages (N=45,940) and analyzed utilizing both qualitative content analysis and interaction process analysis (IPA). This integrated mixed-methods analysis revealed novel insights into the micro-level dynamics of human-machine communication in organizational teams. In response to Slackbot's greetings, acclamations, work-related messages, and relational mes…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
Location of navigation menus in websites: an experimental study with Arabic users
2015
Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…
Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables
2021
Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…
A Cognitive Model of Trust for Biological and Artificial Humanoid Robots
2018
This paper presents a model of trust for biological and artificial humanoid robots and agents as antecedent condition of interaction. We discuss the cognitive engines of social perception that accounts for the units on which agents operate and the rules they follow when they bestow trust and assess trustworthiness. We propose that this structural information is the domain of the model. The model represents it in terms of modular cognitive structures connected by a parallel architecture. Finally we give a preliminary formalization of the model in the mathematical framework of the I/O automata for future computational and human-humanoid application.
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…