Search results for "trust"

showing 10 items of 446 documents

La tutela della concorrenza nella Repubblica Popolare Cinese

2014

La tesi dal titolo “La tutela della concorrenza nella Repubblica Popolare Cinese” si propone di affrontare l’intricato problema dell’armonizzazione dei principi della concorrenza in un sistema economico in via di transizione quale quello cinese. L’attenzione sulla questione è stata stimolata dall’emanazione della legge antimonopoli, entrata in vigore nell’agosto del 2008, che ha conosciuto le sue prime applicazioni concrete nel corso di questi primi cinque anni . Cercando di non lasciarsi sviare dalla tentazione di giudicare la normativa antitrust paese asiatico sul presupposto di una presunta superiorità degli ordinamenti dei paesi occidentali, che in materia posseggono una tradizioni di o…

CinaconcentrazioniChinaConcorrenzaabusiantimonopoliantitrustinteseconcorrenza slealeantimonopolisticacineseSettore IUS/04 - Diritto CommercialeAnti-Monopoly Law
researchProduct

La tutela del convivente non intestatario con riguardo agli apporti conferiti per l’acquisto della casa familiare. Confronti comparatistici.

2013

The essay deals with the financial consequences of the breakdown in relationships between cohabitants through the use of the comparative method applied to English and Italian legal systems. In particular, it explores the case in which the property of family home is conveyed into the sole name of one party, while the other party contributed directly (e.g. through financial contributions to mortgage payments) or indirectly (e.g. payments of the domestic bills) to the payment of the purchase price. Under Italian law, the remedy available for the non-owner cohabitant is identified with unjust enrichment, but it will be accessible only when that contributions to the acquisition of property lacks…

Cohabitation trustConvivenza trustSettore IUS/02 - Diritto Privato Comparato
researchProduct

Psychodynamiques de la vie au travail: la qualité des relations verticales en tant que promoteurs d’engagement, de justice et de confiance organisati…

2008

Commitment Justice Feelings Trust
researchProduct

Anatomy of Cartel Contracts

2013

We study cartel contracts using data on 18 contract clauses of 109 legal Finnish manufacturing cartels. One third of the clauses relate to raising profits; the others deal with instability through incentive compatibility, cartel organization, or external threats. Cartels use three main approaches to raise profits: Price, market allocation, and specialization. These appear to be substitutes. Choosing one has implications on how cartels deal with instability. Simplifying, we find that large cartels agree on prices, cartels in homogenous goods industries allocate markets, and small cartels avoid competition through specialization.

Competition (economics)Microeconomicsjel:K12antitrust; cartels; competition policy; contracts; industry heterogeneityIncentive compatibilitySpecialization (functional)CartelCartels; contracts; antitrust; competition policy; industry heterogeneity.Businessjel:L40jel:L41Competition policyIndustrial organization
researchProduct

Slacking with the Bot: Programmable Social Bot in Virtual Team Interaction

2021

Nonhuman communicators are challenging the prevailing conceptualizations of technology-mediated team communication. Slackbot is a social bot that can be configured to respond to trigger words and, thus, take part in discussions on the platform. A set of 84 bot-related communication episodes were identified from a journalistic team's Slack messages (N=45,940) and analyzed utilizing both qualitative content analysis and interaction process analysis (IPA). This integrated mixed-methods analysis revealed novel insights into the micro-level dynamics of human-machine communication in organizational teams. In response to Slackbot's greetings, acclamations, work-related messages, and relational mes…

Computer Networks and Communications518 Media and communicationsSocial Bots050801 communication & media studiesCOMMUNICATIONchattibotityhteisöviestintäfasilitointi0508 media and communicationsMICROBIOLOGY PROCEDURES0502 economics and businessTECHNOLOGYVirtual TeamsSlackbotConceptualization05 social sciencesVirtual teamtiimityöTeam CommunicationComputer Science ApplicationsEngineering managementOrganizational CommunicationWork teamsInteraction Process AnalysisQualitative AnalysisTRUSTverkkoviestintäPsychology050203 business & managementJournal of Computer-Mediated Communication
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Location of navigation menus in websites: an experimental study with Arabic users

2015

Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…

Computer Networks and CommunicationsComputer scienceArabicFirst languagemedia_common.quotation_subjectWebsite designPopulation050105 experimental psychologyWorld Wide WebReading (process)0501 psychology and cognitive scienceseducationComputer communication networks050107 human factorsmedia_commoneducation.field_of_studybusiness.industry05 social sciencesUsabilitylanguage.human_languageHuman-Computer InteractionTrustworthinessArabic Internet userslanguageThe InternetbusinessMenu locationSoftwareInformation SystemsUniversal Access in the Information Society
researchProduct

Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables

2021

Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…

Computer Networks and CommunicationsComputer scienceunified theory of adoption and use of technology050801 communication & media studiesconsumer trusttekoälysovellusohjelmatGeneralLiterature_MISCELLANEOUS0508 media and communications0502 economics and businessMainstreamSegmentationElectrical and Electronic EngineeringUTAUT2käyttöönottoConsumer behaviourEnd user05 social sciencesCritical factorssegmentationkuluttajakäyttäytyminenartificial intelligenceData scienceheterogeenisuusAntecedent (grammar)segmentointiluottamuskuluttajat050211 marketingSurvey instrumentApplications of artificial intelligencetechnology fearheterogeneity
researchProduct

A Cognitive Model of Trust for Biological and Artificial Humanoid Robots

2018

This paper presents a model of trust for biological and artificial humanoid robots and agents as antecedent condition of interaction. We discuss the cognitive engines of social perception that accounts for the units on which agents operate and the rules they follow when they bestow trust and assess trustworthiness. We propose that this structural information is the domain of the model. The model represents it in terms of modular cognitive structures connected by a parallel architecture. Finally we give a preliminary formalization of the model in the mathematical framework of the I/O automata for future computational and human-humanoid application.

Computer Science (all)TrustworthineAndroid RobotCognitive ArchitectureTrustHuman-Humanoid interaction
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct